Processed: Pending fixes for bugs in the libxml-libxml-perl package

2017-11-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tag 866676 + pending
Bug #866676 {Done: Salvatore Bonaccorso } 
[src:libxml-libxml-perl] libxml-libxml-perl: CVE-2017-10672: Use-after-free in 
XML::LibXML::Node::replaceChild
Ignoring request to alter tags of bug #866676 to the same tags previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
866676: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=866676
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#866676: Pending fixes for bugs in the libxml-libxml-perl package

2017-11-18 Thread pkg-perl-maintainers
tag 866676 + pending
thanks

Some bugs in the libxml-libxml-perl package are closed in revision
852fef98034bebcb843007234f03c31d06fccc7d in branch '  stretch' by
Salvatore Bonaccorso

The full diff can be seen at
https://anonscm.debian.org/cgit/pkg-perl/packages/libxml-libxml-perl.git/commit/?id=852fef9

Commit message:

CVE-2017-10672: Use-after-free by controlling the arguments to a 
replaceChild call

Closes: #866676



Bug#881915: libidn FTBFS with gtk-doc-tools 1.26: gtkdoc-mktmpl is no longer available

2017-11-18 Thread Helmut Grohne
Control: tags -1 + patch

On Thu, Nov 16, 2017 at 02:47:34PM +0200, Adrian Bunk wrote:
> touch scan-build.stamp
> gtkdoc-mktmpl --module=libidn2 
> /bin/bash: gtkdoc-mktmpl: command not found
> Makefile:1259: recipe for target 'tmpl-build.stamp' failed
> make[6]: *** [tmpl-build.stamp] Error 127

libidn2 does not build from source. It failed to run gtkdocize.

Helmut
diff --minimal -Nru libidn2-2.0.4/debian/changelog 
libidn2-2.0.4/debian/changelog
--- libidn2-2.0.4/debian/changelog  2017-09-04 14:17:51.0 +0200
+++ libidn2-2.0.4/debian/changelog  2017-11-17 22:43:07.0 +0100
@@ -1,3 +1,10 @@
+libidn2 (2.0.4-1.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Fix FTBFS: gtkdocize and add dblatex to Build-Depends. (Closes: #881915)
+
+ -- Helmut Grohne   Fri, 17 Nov 2017 22:43:07 +0100
+
 libidn2 (2.0.4-1) unstable; urgency=medium
 
   * Add myself to Uploaders
diff --minimal -Nru libidn2-2.0.4/debian/control libidn2-2.0.4/debian/control
--- libidn2-2.0.4/debian/control2017-09-04 14:17:51.0 +0200
+++ libidn2-2.0.4/debian/control2017-11-17 22:43:07.0 +0100
@@ -12,7 +12,8 @@
ruby-ronn,
texinfo,
texlive,
-   gtk-doc-tools
+   gtk-doc-tools,
+   dblatex,
 Standards-Version: 4.1.0
 Priority: optional
 Homepage: https://www.gnu.org/software/libidn/#libidn2
diff --minimal -Nru libidn2-2.0.4/debian/rules libidn2-2.0.4/debian/rules
--- libidn2-2.0.4/debian/rules  2017-09-04 14:17:51.0 +0200
+++ libidn2-2.0.4/debian/rules  2017-11-17 22:43:07.0 +0100
@@ -5,6 +5,11 @@
 %:
dh $@ --parallel --with autoreconf --fail-missing 
-O--dbgsym-migration="libidn2-0-dbg (<< 2.0.2-1~)" -X.la
 
+override_dh_autoreconf:
+   rm -f gtk-doc.make
+   gtkdocize
+   dh_autoreconf
+
 override_dh_auto_configure:
dh_auto_configure -- \
--enable-ld-version-script \


Processed: Re: Bug#881915: libidn FTBFS with gtk-doc-tools 1.26: gtkdoc-mktmpl is no longer available

2017-11-18 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + patch
Bug #881915 [src:libidn2] libidn FTBFS with gtk-doc-tools 1.26: gtkdoc-mktmpl 
is no longer available
Added tag(s) patch.

-- 
881915: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881915
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#882052: byte-buddy: missing build dependency on libeclipse-aether-java

2017-11-18 Thread Adrian Bunk
Source: byte-buddy
Version: 1.7.2-1
Severity: serious

https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/byte-buddy.html

...
[INFO] 
[INFO] 
[INFO] Skipping Byte Buddy (parent)
[INFO] This project has been banned from the build due to previous failures.
[INFO] 
[INFO] 
[INFO] Reactor Summary:
[INFO] 
[INFO] Byte Buddy (parent)  SUCCESS [  1.141 s]
[INFO] Byte Buddy (with dependencies) . SUCCESS [01:20 min]
[INFO] Byte Buddy (without dependencies) .. SUCCESS [  4.145 s]
[INFO] Byte Buddy (Maven plugin) .. FAILURE [  0.025 s]
[INFO] 
[INFO] BUILD FAILURE
[INFO] 
[INFO] Total time: 01:26 min
[INFO] Finished at: 2018-12-20T16:58:06-12:00
[INFO] Final Memory: 42M/1586M
[INFO] 
[ERROR] Failed to execute goal on project byte-buddy-maven-plugin: Could not 
resolve dependencies for project 
net.bytebuddy:byte-buddy-maven-plugin:maven-plugin:1.7.2: The following 
artifacts could not be resolved: org.eclipse.aether:aether-api:jar:debian, 
org.eclipse.aether:aether-util:jar:debian: Cannot access central 
(https://repo.maven.apache.org/maven2) in offline mode and the artifact 
org.eclipse.aether:aether-api:jar:debian has not been downloaded from it 
before. -> [Help 1]
[ERROR] 
[ERROR] To see the full stack trace of the errors, re-run Maven with the -e 
switch.
[ERROR] Re-run Maven using the -X switch to enable full debug logging.
[ERROR] 
[ERROR] For more information about the errors and possible solutions, please 
read the following articles:
[ERROR] [Help 1] 
http://cwiki.apache.org/confluence/display/MAVEN/DependencyResolutionException
[ERROR] 
[ERROR] After correcting the problems, you can resume the build with the command
[ERROR]   mvn  -rf :byte-buddy-maven-plugin
dh_auto_build: /usr/lib/jvm/default-java/bin/java -noverify -cp 
/usr/share/maven/boot/plexus-classworlds-2.x.jar:/usr/lib/jvm/default-java/lib/tools.jar
 -Dmaven.home=/usr/share/maven 
-Dmaven.multiModuleProjectDirectory=/build/1st/byte-buddy-1.7.2 
-Dclassworlds.conf=/etc/maven/m2-debian.conf 
-Dproperties.file.manual=/build/1st/byte-buddy-1.7.2/debian/maven.properties 
org.codehaus.plexus.classworlds.launcher.Launcher 
-s/etc/maven/settings-debian.xml 
-Ddebian.dir=/build/1st/byte-buddy-1.7.2/debian 
-Dmaven.repo.local=/build/1st/byte-buddy-1.7.2/debian/maven-repo --batch-mode 
package javadoc:jar javadoc:aggregate -DskipTests -Dnotimestamp=true 
-Dlocale=en_US returned exit code 1
debian/rules:4: recipe for target 'build' failed
make: *** [build] Error 2



Bug#874708: anthy (EUCJP->UTF-8) and *-anthy packages

2017-11-18 Thread Adrian Bunk
On Wed, Nov 15, 2017 at 10:20:31PM +0200, Adrian Bunk wrote:
>...
> It might be enough to just close this bug - this bug is currently the 
> main blocker for the testing migration.

An update on the situation:

The problem is now that gcin/hime/uim that are part of the anthy  
transition are also part of a Qt transition that is blocked by
problems in mariadb.

>From an anthy point of view that means just wait until this has
been sorted out.

cu
Adrian

-- 

   "Is there not promise of rain?" Ling Tan asked suddenly out
of the darkness. There had been need of rain for many days.
   "Only a promise," Lao Er said.
   Pearl S. Buck - Dragon Seed



Bug#882055: Gedit breaks when writing to a file

2017-11-18 Thread Narcis Garcia
Package: gedit
Version: 3.22.0-2 (also 3.14 and 3.18)
Severity: grave

(reproduced with amd64 architecture, Gnome desktop)
Problem occurs on 30% of tries

1. Open an existing file with Gedit
2. Modify something
3. Save (i.e. pressing Ctrl+S)

Results:

- Gedit breaks with message:
GLib-GIO:ERROR:/build/glib2.0-B1uXKV/glib2.0-2.50.3/./gio/glocalfilemonitor.c:433:g_file_monitor_source_handle_event:
code should not be reached

- Text file is truncated to 0 bytes. No backup. Unrecoverable content.

-- 


__
I'm using this express-made address because personal addresses aren't
masked enough at this mail public archive. Public archive administrator
should fix this against automated addresses collectors.



Bug#878270: marked as done (This NMU of anthy is not good enough)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 11:18:13 +0200
with message-id <20171118091813.kf7umtdwes45od6g@localhost>
and subject line The 1:0.3-5.1 NMU never entered unstable
has caused the Debian Bug report #878270,
regarding This NMU of anthy is not good enough
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
878270: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878270
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: anthy
Severity: grave
Version: 1:0.3-5.1

In short, my NMU was bad.

I need to upload new version based on 1:0.3-5.
(Maybe with typo fix.)

Although NMU tries to accomodate slow library migration, it doesn't
reach its goal.

This is due to binary packages anthy and anthy-common arn't
versioned.  Itis too much and fixing ibus-anthy and letting it
migrate together is better.

-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.13.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

-- debconf information excluded
--- End Message ---
--- Begin Message ---
The 1:0.3-5.1 NMU never entered unstable, closing this bug.

cu
Adrian

-- 

   "Is there not promise of rain?" Ling Tan asked suddenly out
of the darkness. There had been need of rain for many days.
   "Only a promise," Lao Er said.
   Pearl S. Buck - Dragon Seed--- End Message ---


Bug#881881: marked as done (libtrilinos-kokkos-kernels-dev: fails to upgrade from 'testing' - trying to overwrite /usr/include/trilinos/Kokkos_ArithTraits.hpp)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 09:19:57 +
with message-id 
and subject line Bug#881881: fixed in trilinos 12.12.1-2
has caused the Debian Bug report #881881,
regarding libtrilinos-kokkos-kernels-dev: fails to upgrade from 'testing' - 
trying to overwrite /usr/include/trilinos/Kokkos_ArithTraits.hpp
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
881881: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881881
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libtrilinos-kokkos-kernels-dev
Version: 12.12.1-1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package fails to upgrade from
'testing'.
It installed fine in 'testing', then the upgrade to 'sid' fails
because it tries to overwrite other packages files without declaring a
Breaks+Replaces relation.

See policy 7.6 at
https://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces

>From the attached log (scroll to the bottom...):

  Selecting previously unselected package libtrilinos-kokkos-kernels-dev:amd64.
  Preparing to unpack .../libtrilinos-kokkos-kernels-dev_12.12.1-1_amd64.deb ...
  Unpacking libtrilinos-kokkos-kernels-dev:amd64 (12.12.1-1) ...
  dpkg: error processing archive 
/var/cache/apt/archives/libtrilinos-kokkos-kernels-dev_12.12.1-1_amd64.deb 
(--unpack):
   trying to overwrite '/usr/include/trilinos/Kokkos_ArithTraits.hpp', which is 
also in package libtrilinos-tpetra-dev 12.10.1-4+b1
  dpkg-deb: error: paste subprocess was killed by signal (Broken pipe)
  Errors were encountered while processing:
   /var/cache/apt/archives/libtrilinos-kokkos-kernels-dev_12.12.1-1_amd64.deb


cheers,

Andreas


libtrilinos-tpetra-dev=12.10.1-4+b1_libtrilinos-kokkos-kernels-dev=12.12.1-1.log.gz
Description: application/gzip
--- End Message ---
--- Begin Message ---
Source: trilinos
Source-Version: 12.12.1-2

We believe that the bug you reported is fixed in the latest version of
trilinos, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 881...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Nico Schlömer  (supplier of updated trilinos package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 17 Nov 2017 14:48:55 +0100
Source: trilinos
Binary: trilinos-all-dev trilinos-dev libtrilinos-amesos12 
libtrilinos-amesos-dev libtrilinos-amesos2-12 libtrilinos-amesos2-dev 
libtrilinos-anasazi12 libtrilinos-anasazi-dev libtrilinos-aztecoo12 
libtrilinos-aztecoo-dev libtrilinos-belos12 libtrilinos-belos-dev 
libtrilinos-epetra12 libtrilinos-epetra-dev libtrilinos-epetraext12 
libtrilinos-epetraext-dev libtrilinos-galeri12 libtrilinos-galeri-dev 
libtrilinos-globipack12 libtrilinos-globipack-dev libtrilinos-ifpack12 
libtrilinos-ifpack-dev libtrilinos-ifpack2-12 libtrilinos-ifpack2-dev 
libtrilinos-intrepid12 libtrilinos-intrepid-dev libtrilinos-isorropia12 
libtrilinos-isorropia-dev libtrilinos-kokkos12 libtrilinos-kokkos-dev 
libtrilinos-kokkos-kernels12 libtrilinos-kokkos-kernels-dev 
libtrilinos-komplex12 libtrilinos-komplex-dev libtrilinos-ml12 
libtrilinos-ml-dev libtrilinos-moertel12 libtrilinos-moertel-dev 
libtrilinos-muelu12 libtrilinos-muelu-dev libtrilinos-nox12 libtrilinos-nox-dev 
libtrilinos-optipack12
 libtrilinos-optipack-dev libtrilinos-pamgen12 libtrilinos-pamgen-dev 
libtrilinos-phalanx12 libtrilinos-phalanx-dev libtrilinos-pike12 
libtrilinos-pike-dev libtrilinos-piro12 libtrilinos-piro-dev 
libtrilinos-pliris12 libtrilinos-pliris-dev libtrilinos-rol12 
libtrilinos-rol-dev libtrilinos-rtop12 libtrilinos-rtop-dev 
libtrilinos-rythmos12 libtrilinos-rythmos-dev libtrilinos-sacado12 
libtrilinos-sacado-dev libtrilinos-shards12 libtrilinos-shards-dev 
libtrilinos-shylu12 libtrilinos-shylu-dev libtrilinos-trilinosss12 
libtrilinos-trilinosss-dev libtrilinos-stokhos12 libtrilinos-stokhos-dev 
libtrilinos-stratimikos12 libtrilinos-stratimikos-dev libtrilinos-teko12 
libtrilinos-teko-dev libtrilinos-teuchos12 libtrilinos-teuchos-dev 
libtrilinos-thyra12 libtrilinos-thyra-dev libtrilinos-tpetra12 
libtrilinos-tpetra-dev libtrilinos-trilinoscouplings12 

Bug#880339: marked as done (golang-github-pingcap-check: FTBFS: dh_auto_test: cd obj-x86_64-linux-gnu && go test -v -p 16 github.com/pingcap/check returned exit code 1)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 09:19:08 +
with message-id 
and subject line Bug#880339: fixed in golang-github-pingcap-check 
0.0~git20170902.0.4c65d06-2
has caused the Debian Bug report #880339,
regarding golang-github-pingcap-check: FTBFS: dh_auto_test: cd 
obj-x86_64-linux-gnu && go test -v -p 16 github.com/pingcap/check returned exit 
code 1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
880339: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880339
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: golang-github-pingcap-check
Version: 0.0~git20170902.0.4c65d06-1
Severity: serious
Tags: buster sid
User: debian...@lists.debian.org
Usertags: qa-ftbfs-20171030 qa-ftbfs
Justification: FTBFS on amd64

Hi,

During a rebuild of all packages in sid, your package failed to build on
amd64.

Relevant part (hopefully):
>  debian/rules build
> dh build --buildsystem=golang --with=golang
>dh_update_autotools_config -O--buildsystem=golang
>dh_autoreconf -O--buildsystem=golang
>dh_auto_configure -O--buildsystem=golang
>dh_auto_build -O--buildsystem=golang
>   cd obj-x86_64-linux-gnu && go install 
> -gcflags=\"-trimpath=/<>/golang-github-pingcap-check-0.0\~git20170902.0.4c65d06/obj-x86_64-linux-gnu/src\"
>  
> -asmflags=\"-trimpath=/<>/golang-github-pingcap-check-0.0\~git20170902.0.4c65d06/obj-x86_64-linux-gnu/src\"
>  -v -p 16 github.com/pingcap/check
> github.com/pingcap/check
>dh_auto_test -O--buildsystem=golang
>   cd obj-x86_64-linux-gnu && go test -v -p 16 github.com/pingcap/check
> === RUN   Test
> 
> --
> FAIL: benchmark_test.go:40: BenchmarkS.TestBenchmark
> 
> benchmark_test.go:60:
> c.Assert(output.value, Matches, expected)
> ... value string = "PASS: check_test.go:144: FixtureHelper.Benchmark1\t  
> 50\t223353 ns/op\n"
> ... regex string = "PASS: check_test\\.go:[0-9]+: 
> FixtureHelper\\.Benchmark1\t *100\t *[12][0-9]{5} ns/op\n"
> 
> 
> --
> FAIL: benchmark_test.go:63: BenchmarkS.TestBenchmarkBytes
> 
> benchmark_test.go:75:
> c.Assert(output.value, Matches, expected)
> ... value string = "PASS: check_test.go:151: FixtureHelper.Benchmark2\t  
> 50\t226049 ns/op\t   4.53 MB/s\n"
> ... regex string = "PASS: check_test\\.go:[0-9]+: 
> FixtureHelper\\.Benchmark2\t *100\t *[12][0-9]{5} ns/op\t *[4-9]\\.[0-9]{2} 
> MB/s\n"
> 
> 
> --
> FAIL: benchmark_test.go:78: BenchmarkS.TestBenchmarkMem
> 
> benchmark_test.go:91:
> c.Assert(output.value, Matches, expected)
> ... value string = "PASS: check_test.go:159: FixtureHelper.Benchmark3\t  
> 50\t226753 ns/op\t  89 B/op\t   1 allocs/op\n"
> ... regex string = "PASS: check_test\\.go:[0-9]+: 
> FixtureHelper\\.Benchmark3\t *100\t *[12][0-9]{5} ns/op\t *[0-9]+ B/op\t 
> *[1-9] allocs/op\n"
> 
> OOPS: 127 passed, 3 FAILED
> --- FAIL: Test (0.13s)
> FAIL
> exit status 1
> FAIL  github.com/pingcap/check0.133s
> dh_auto_test: cd obj-x86_64-linux-gnu && go test -v -p 16 
> github.com/pingcap/check returned exit code 1

The full build log is available from:
   
http://aws-logs.debian.net/2017/10/30/golang-github-pingcap-check_0.0~git20170902.0.4c65d06-1_unstable.log

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

About the archive rebuild: The rebuild was done on EC2 VM instances from
Amazon Web Services, using a clean, minimal and up-to-date chroot. Every
failed build was retried once to eliminate random failures.
--- End Message ---
--- Begin Message ---
Source: golang-github-pingcap-check
Source-Version: 0.0~git20170902.0.4c65d06-2

We believe that the bug you reported is fixed in the latest version of
golang-github-pingcap-check, which is due to be installed in the Debian FTP 
archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 880...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Lustfield  (supplier of updated 
golang-github-pingcap-check package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-m

Bug#881857: add CVE

2017-11-18 Thread Ferenc Wágner
"Cantor, Scott"  writes:

> On 11/17/17, 11:48 AM, "Pkg-shibboleth-devel on behalf of Ferenc Wágner" 
>  behalf of wf...@niif.hu> wrote:
>
>> Now, this is still ongoing:
>> https://release.debian.org/transitions/html/auto-xerces-c.html
>> The upstream fixes for this issue appeared as new patch level releases
>> for XMLTooling (1.6.2), OpenSAML (2.6.1) and the SP (2.6.1).  Shall I
>> wait for the transition to finish before uploading them?
>
> Sorry if I'm misinterpreting, but is this a source level issue or just
> a question of ABI/build decision? SP 2.6.0/etc. definitely should
> build against Xerces 3.2, and probably many older SP versions would
> also. But if you're just referring to what they were built with in
> Debian packaging cases to date, disregard.

There are no known source-level problems here, it's just that Xerces 3.2
recently replaced 3.1 in Debian unstable, and now all packages using
Xerces are being rebuilt for the new ABI.  Any errors you see there
should be gone once the necessary rebuilds are triggered in the proper
order.  I checked manually that XMLTooling 1.6 in unstable now already
builds with Xerces 3.2 without any changes.  But uploading new versions
can be disruptive during such periods, that's why I asked the security
team about the best course of action.
-- 
Regards,
Feri



Bug#881496: [Pkg-privacy-maintainers] Bug#881496: onioncircuits: current python3/testing breaks onioncircuits

2017-11-18 Thread Sascha Steinbiss
Hi Mykola,

thanks for letting us know about the issue.

> --8<---cut here---start->8---
> $ onioncircuits 
> Traceback (most recent call last):
>   File "/usr/bin/onioncircuits", line 31, in 
> import stem.connection
>   File "/usr/lib/python3/dist-packages/stem/connection.py", line 134, in 
> 
> import stem.control
>   File "/usr/lib/python3/dist-packages/stem/control.py", line 265, in 
> import stem.descriptor.microdescriptor
>   File "/usr/lib/python3/dist-packages/stem/descriptor/__init__.py", line 55, 
> in 
> import stem.util.system
>   File "/usr/lib/python3/dist-packages/stem/util/system.py", line 68, in 
> 
> import ctypes
>   File "/usr/lib/python3.6/ctypes/__init__.py", line 7, in 
> from _ctypes import Union, Structure, Array
> ImportError: 
> /usr/lib/python3.6/lib-dynload/_ctypes.cpython-36m-x86_64-linux-gnu.so: 
> failed to map segment from shared object
> --8<---cut here---end--->8---

Unfortunately I an unable to reproduce this on a fresh testing amd64
Vagrant box with the same versions of python3 and stem that you are using:

  vagrant@testing:~$ apt show python3 python3-stem | grep Vers
  [...]
  Version: 3.6.3-2
  Version: 1.6.0-1

Onioncircuits (0.5-1) starts up fine and displays correct data. All I
did to set up my testing environment was installing onioncircuits, tor
and then adding the Vagrant user to the debian-tor group (so
onioncircuits would work as user).

Some googling for the "failed to map segment from shared object" message
seems to suggest some issue with missing filesystem execute permissions,
but given that it's /usr/lib we're looking at here and downgrading to
another python3 version fixes the problem, it's unlikely that's the cause.

Can anyone else in the team reproduce this issue or probably comment?

Cheers
Sascha




signature.asc
Description: OpenPGP digital signature


Bug#882059: python-ibus package is missing in testing repository

2017-11-18 Thread Ben Goodwin
Package: python-ibus
Version: 1.5.1.is.1.4.2-1~bpo70+1
Severity: grave
Tags: l10n
Justification: renders package unusable



-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.13.0-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8), 
LANGUAGE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages python-ibus depends on:
ii  iso-codes3.76-1
ii  python   2.7.14-1
ii  python-dbus  1.2.4-1+b4
ii  python-gtk2  2.24.0-5.1

python-ibus recommends no packages.

python-ibus suggests no packages.

-- no debconf information

The package python-ibus is missing from the testing repository. The
latest python-ibus package available is in wheezy-backports. I am using
Debian testing (buster), so python-ibus is not available to me.
This causes ibus-tegaki to fail which prevents me from launching the
tegaki Japanese/Chinese handwriting IME via the ibus hotkeys and tray
icon.

According to the tegaki developers, python-ibus is a dependency for
ibus-tegaki, even though the maintainer of the ibus-tegaki Debian
package never included python-ibus as a dependency. In the past I have
been able to get ibus-tegaki to work by installing python-ibus, but that
is not possible now. I tried installiing the version of python-ibus
available in wheezy-backports, but it does not work, presumably because it
was compiled for wheezy and not for the current testing version
(buster).

I request that the python-ibus package be made available in the current
Debian repositories since it is required for ibus-tegaki and possibly
other packages to function.

Thank you.



Bug#882055: Gedit breaks when writing to a file

2017-11-18 Thread Narcis Garcia
Nautilus seems to break at same time.
Circumstance can be that files to write has r+w permission for
everybody, but aren't owned by current user (i.e.: root:users)

-- 


__
I'm using this express-made address because personal addresses aren't
masked enough at this mail public archive. Public archive administrator
should fix this against automated addresses collectors.



Processed: Merge duplicates

2017-11-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 882011 src:python-cryptography
Bug #882011 [python-cryptography] python-cryptography: no longer depends on 
cffi-backend, offlineimap fails to start
Bug reassigned from package 'python-cryptography' to 'src:python-cryptography'.
No longer marked as found in versions python-cryptography/2.1.3-1.
Ignoring request to alter fixed versions of bug #882011 to the same values 
previously set
> forcemerge 882016 882011
Bug #882016 [src:python-cryptography] python{,3}-cryptography lost dependencies
Bug #882011 [src:python-cryptography] python-cryptography: no longer depends on 
cffi-backend, offlineimap fails to start
Severity set to 'serious' from 'grave'
Added indication that 882011 affects python-cryptography,python3-cryptography
Marked as found in versions python-cryptography/2.1.3-1.
Merged 882011 882016
> retitle 882011 python{,3}-cryptography lost required dependencies
Bug #882011 [src:python-cryptography] python-cryptography: no longer depends on 
cffi-backend, offlineimap fails to start
Bug #882016 [src:python-cryptography] python{,3}-cryptography lost dependencies
Changed Bug title to 'python{,3}-cryptography lost required dependencies' from 
'python-cryptography: no longer depends on cffi-backend, offlineimap fails to 
start'.
Changed Bug title to 'python{,3}-cryptography lost required dependencies' from 
'python{,3}-cryptography lost dependencies'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
882011: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882011
882016: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882016
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: tagging 882011

2017-11-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 882011 + pending
Bug #882011 [src:python-cryptography] python{,3}-cryptography lost required 
dependencies
Bug #882016 [src:python-cryptography] python{,3}-cryptography lost required 
dependencies
Added tag(s) pending.
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
882011: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882011
882016: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882016
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#881496: [Pkg-privacy-maintainers] Bug#881496: Bug#881496: onioncircuits: current python3/testing breaks onioncircuits

2017-11-18 Thread intrigeri
Sascha Steinbiss:
> Can anyone else in the team reproduce this issue or probably comment?

I can't reproduce this on current sid.



Processed: Bug#882011 marked as pending

2017-11-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tag 882011 pending
Bug #882011 [src:python-cryptography] python{,3}-cryptography lost required 
dependencies
Bug #882016 [src:python-cryptography] python{,3}-cryptography lost required 
dependencies
Ignoring request to alter tags of bug #882011 to the same tags previously set
Ignoring request to alter tags of bug #882016 to the same tags previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
882011: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882011
882016: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882016
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#882011: marked as pending

2017-11-18 Thread Tristan Seligmann
tag 882011 pending
thanks

Hello,

Bug #882011 reported by you has been fixed in the Git repository. You can
see the changelog below, and you can check the diff of the fix at:


https://anonscm.debian.org/cgit/python-modules/packages/python-cryptography.git/commit/?id=ce4d74e

---
commit ce4d74e24857f4bc9724657522e879d8327c5742
Author: Tristan Seligmann 
Date:   Sat Nov 18 13:04:34 2017 +0200

Work around lack of environment marker support in dh_python by explicitly 
listing dependencies.

diff --git a/debian/changelog b/debian/changelog
index cc9159b..bb6de2a 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,10 @@
+python-cryptography (2.1.3-2) unstable; urgency=medium
+
+  * Work around lack of environment marker support in dh_python by
+explicitly listing dependencies (closes: #882011).
+
+ -- Tristan Seligmann   Sat, 18 Nov 2017 13:16:11 +0200
+
 python-cryptography (2.1.3-1) unstable; urgency=medium
 
   * New upstream release (closes: #874456).



Processed: same thing for python-enum34

2017-11-18 Thread Debian Bug Tracking System
Processing control commands:

> retitle -1 python-cryptography: no longer depends on cffi-backend and enum, 
> programs fail to start
Bug #882011 [src:python-cryptography] python{,3}-cryptography lost required 
dependencies
Bug #882016 [src:python-cryptography] python{,3}-cryptography lost required 
dependencies
Changed Bug title to 'python-cryptography: no longer depends on cffi-backend 
and enum, programs fail to start' from 'python{,3}-cryptography lost required 
dependencies'.
Changed Bug title to 'python-cryptography: no longer depends on cffi-backend 
and enum, programs fail to start' from 'python{,3}-cryptography lost required 
dependencies'.

-- 
882011: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882011
882016: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882016
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#882011: same thing for python-enum34

2017-11-18 Thread Riccardo Stagni
Control: retitle -1 python-cryptography: no longer depends on cffi-backend and 
enum, programs fail to start

The same is happening with obnam and python-enum34:

riccio@hactar:~$ obnam generations
Traceback (most recent call last):
  File "/usr/bin/obnam", line 18, in 
import obnamlib
  File "/usr/lib/python2.7/dist-packages/obnamlib/__init__.py", line 91, in 

from .app import App, ObnamIOError, ObnamSystemError
  File "/usr/lib/python2.7/dist-packages/obnamlib/app.py", line 25, in 
import paramiko
  File "/usr/lib/python2.7/dist-packages/paramiko/__init__.py", line 30, in 

from paramiko.transport import SecurityOptions, Transport
  File "/usr/lib/python2.7/dist-packages/paramiko/transport.py", line 33, in 

from cryptography.hazmat.primitives.ciphers import algorithms, Cipher, modes
  File 
"/usr/lib/python2.7/dist-packages/cryptography/hazmat/primitives/ciphers/__init__.py",
 line 7, in 
from cryptography.hazmat.primitives.ciphers.base import (
  File 
"/usr/lib/python2.7/dist-packages/cryptography/hazmat/primitives/ciphers/base.py",
 line 12, in 
from cryptography.exceptions import (
  File "/usr/lib/python2.7/dist-packages/cryptography/exceptions.py", line 7, 
in 
from enum import Enum
ImportError: No module named enum

Thanks,
Riccardo



Bug#882011: marked as done (python-cryptography: no longer depends on cffi-backend and enum, programs fail to start)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 11:34:36 +
with message-id 
and subject line Bug#882011: fixed in python-cryptography 2.1.3-2
has caused the Debian Bug report #882011,
regarding python-cryptography: no longer depends on cffi-backend and enum, 
programs fail to start
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
882011: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882011
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: python-cryptography
Version: 2.1.3-1
Severity: grave
Justification: renders package unusable (I think, please drop severity if not)

I use offlineimap with python-keyring, retrieving my IMAP password from
gnome-keyring. This uses python-secretstorage and python-cryptography
behind the scenes.

I recently upgraded python[3]-cryptography from 1.9-1 to 2.1.3-1. During
this transaction, the python[3]-cffi-backend packages were removed as
"no longer used". This causes a previously-working offlineimap configuration
to fail:

ERROR: While attempting to sync account ''
  No module named _cffi_backend
...
  File "", line 1, in 
  File "/usr/lib/python2.7/dist-packages/keyring/core.py", line 41, in 
get_password
return _keyring_backend.get_password(service_name, username)
  File "/usr/lib/python2.7/dist-packages/keyring/backends/SecretService.py", 
line 65, in get_password
return item.get_secret().decode('utf-8')
  File "/usr/lib/python2.7/dist-packages/secretstorage/item.py", line 102, in 
get_secret
decryptor = Cipher(aes, modes.CBC(aes_iv), default_backend()).decryptor()
  File 
"/usr/lib/python2.7/dist-packages/cryptography/hazmat/backends/__init__.py", 
line 15, in default_backend
from cryptography.hazmat.backends.openssl.backend import backend
  File 
"/usr/lib/python2.7/dist-packages/cryptography/hazmat/backends/openssl/__init__.py",
 line 7, in 
from cryptography.hazmat.backends.openssl.backend import backend
  File 
"/usr/lib/python2.7/dist-packages/cryptography/hazmat/backends/openssl/backend.py",
 line 16, in 
from cryptography import utils, x509
  File "/usr/lib/python2.7/dist-packages/cryptography/x509/__init__.py", line 
8, in 
from cryptography.x509.base import (
  File "/usr/lib/python2.7/dist-packages/cryptography/x509/base.py", line 16, 
in 
from cryptography.x509.extensions import Extension, ExtensionType
  File "/usr/lib/python2.7/dist-packages/cryptography/x509/extensions.py", line 
18, in 
from cryptography.hazmat.primitives import constant_time, serialization
  File 
"/usr/lib/python2.7/dist-packages/cryptography/hazmat/primitives/constant_time.py",
 line 9, in 
from cryptography.hazmat.bindings._constant_time import lib

I've set a release-critical severity to block testing migration, on
the assumption that this breaks all other uses of python-cryptography.
If that isn't true, please drop the severity.

Regards,
smcv

-- System Information:
Debian Release: buster/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'buildd-unstable'), (500, 
'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental-debug'), (1, 
'buildd-experimental'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.13.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8), LANGUAGE=en_GB:en 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages python-cryptography depends on:
ii  libc6  2.24-17
ii  libssl1.1  1.1.0g-2
ii  python 2.7.14-1
ii  python-asn1crypto  0.22.0-1
ii  python-idna2.5-1
ii  python-six 1.11.0-1

python-cryptography recommends no packages.

Versions of packages python-cryptography suggests:
pn  python-cryptography-doc  
pn  python-cryptography-vectors  

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: python-cryptography
Source-Version: 2.1.3-2

We believe that the bug you reported is fixed in the latest version of
python-cryptography, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 882...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Tristan Seligmann  (supplier of updated 
python-cryptography package)

(This message was generated automatically at their request; if you
believe that

Bug#882016: marked as done (python-cryptography: no longer depends on cffi-backend and enum, programs fail to start)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 11:34:36 +
with message-id 
and subject line Bug#882011: fixed in python-cryptography 2.1.3-2
has caused the Debian Bug report #882011,
regarding python-cryptography: no longer depends on cffi-backend and enum, 
programs fail to start
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
882011: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882011
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: python-cryptography
Version: 2.1.3-1
Severity: serious
Control: affects -1 python-cryptography python3-cryptography

Looking at the changelog, it doesn't seem to be intentional
that python{,3}-cryptography lost their cffi dependencies
as well as some other dependencies.
--- End Message ---
--- Begin Message ---
Source: python-cryptography
Source-Version: 2.1.3-2

We believe that the bug you reported is fixed in the latest version of
python-cryptography, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 882...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Tristan Seligmann  (supplier of updated 
python-cryptography package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 18 Nov 2017 13:16:11 +0200
Source: python-cryptography
Binary: python-cryptography python3-cryptography python-cryptography-doc
Architecture: source
Version: 2.1.3-2
Distribution: unstable
Urgency: medium
Maintainer: Tristan Seligmann 
Changed-By: Tristan Seligmann 
Description:
 python-cryptography - Python library exposing cryptographic recipes and 
primitives (Pyt
 python-cryptography-doc - Python library exposing cryptographic recipes and 
primitives (doc
 python3-cryptography - Python library exposing cryptographic recipes and 
primitives (Pyt
Closes: 882011
Changes:
 python-cryptography (2.1.3-2) unstable; urgency=medium
 .
   * Work around lack of environment marker support in dh_python by
 explicitly listing dependencies (closes: #882011).
Checksums-Sha1:
 69289113c2f5a9d9da5fa4fe406cbae7d78bfeec 3257 python-cryptography_2.1.3-2.dsc
 b84ca193a892c76e006717dadfc10cfea7003ea0 24828 
python-cryptography_2.1.3-2.debian.tar.xz
 7c3f6238bafd87be5f9f140987488f2f38c9db86 7826 
python-cryptography_2.1.3-2_source.buildinfo
Checksums-Sha256:
 b8697f65a0046eb96f8145000649246d528c31602afe1a80897a743ec1fec2ec 3257 
python-cryptography_2.1.3-2.dsc
 59c946c14e9815c91104f87fe8599c39003f7205451f1c34e4391cf447f60aa4 24828 
python-cryptography_2.1.3-2.debian.tar.xz
 c31f5259fbbad36cf101109d525c7791898e08b41d2e6bc73cb874795516a930 7826 
python-cryptography_2.1.3-2_source.buildinfo
Files:
 d1ab9b2d6d48a5923b4abff858ebc9f0 3257 python optional 
python-cryptography_2.1.3-2.dsc
 b974160bf153f6318760360811ce5b26 24828 python optional 
python-cryptography_2.1.3-2.debian.tar.xz
 0aa2d4c7f8e18e97c873bc0bbac0b9ab 7826 python optional 
python-cryptography_2.1.3-2_source.buildinfo

-BEGIN PGP SIGNATURE-

iQGpBAEBCgCTFiEEXAZWhXVRbQoz/6ejwImQ+x9jeJMFAloQGLZfFIAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDVD
MDY1Njg1NzU1MTZEMEEzM0ZGQTdBM0MwODk5MEZCMUY2Mzc4OTMVHG1pdGhyYW5k
aUBkZWJpYW4ub3JnAAoJEMCJkPsfY3iT3aMH/RRClzWALYgrgql9aiKQF1B9ylXj
grp9lzCnIYLfAznuwCCG1vXaSCsRiqyUq1QcqmUNslf/X2HhmbDCiUvaQiqYrFzi
Z404YUSINvamunsf0UQ+HnEukP/sk2RfXJlYCckCxA7zOlGJMLs0wiOVRX1X3dag
B2VAd9ja68boX4VSoYnhtAMIdPtfAoV19yMBps5KeTD3cdOYi51O1qycPRGxgwiS
I6JR3MGG07HLQ5R928EgQK+uncPSIKVCprSL95heKcT12+52jDE1V48LhOcv/DT+
1JAinCnh2rqzQ5dqZc/nRkrwnVOBiSmMQzcpIVGdRA+2M/NSaTTBQuDELCA=
=lJ8f
-END PGP SIGNATURE End Message ---


Bug#882011: same thing for python-enum34

2017-11-18 Thread Riccardo Stagni
Uops, sorry, I have just seen you already retitled/fixed the bug...

I'm sorry for the noise.

Riccardo



Bug#859551: marked as done (pgbouncer: Please migrate to openssl1.1 in buster)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 11:50:33 +
with message-id 
and subject line Bug#859551: fixed in pgbouncer 1.7.2-65-g2b8e6cf-1
has caused the Debian Bug report #859551,
regarding pgbouncer: Please migrate to openssl1.1 in buster
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
859551: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859551
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: pgbouncer
Version: 1.7.2-1
Severity: important
Control: block 827061 by -1

Hi,

OpenSSL 1.1.0 is about to released.  During a rebuild of all packages using
OpenSSL this package fail to build.  A log of that build can be found at:
https://breakpoint.cc/openssl-1.1-rebuild-2016-05-29/Attempted/pgbouncer_1.7.2-1_amd64-20160529-1506

On https://wiki.openssl.org/index.php/1.1_API_Changes you can see various of the
reasons why it might fail.  There are also updated man pages at
https://www.openssl.org/docs/manmaster/ that should contain useful information.

There is a libssl-dev package available in experimental that contains a recent
snapshot, I suggest you try building against that to see if everything works.

If you have problems making things work, feel free to contact us.


Kurt
--- End Message ---
--- Begin Message ---
Source: pgbouncer
Source-Version: 1.7.2-65-g2b8e6cf-1

We believe that the bug you reported is fixed in the latest version of
pgbouncer, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 859...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christoph Berg  (supplier of updated pgbouncer package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 17 Nov 2017 18:38:18 +0100
Source: pgbouncer
Binary: pgbouncer
Architecture: source
Version: 1.7.2-65-g2b8e6cf-1
Distribution: unstable
Urgency: medium
Maintainer: Debian PostgreSQL Maintainers 

Changed-By: Christoph Berg 
Description:
 pgbouncer  - lightweight connection pooler for PostgreSQL
Closes: 859551
Changes:
 pgbouncer (1.7.2-65-g2b8e6cf-1) unstable; urgency=medium
 .
   * New upstream snapshot, supports openssl 1.1. Closes: #859551.
Checksums-Sha1:
 ebf97ea3e48197516b06185c4ecb0f9436b24bab 2339 pgbouncer_1.7.2-65-g2b8e6cf-1.dsc
 722be385147431aa728d40e612c2651eb5fa0031 533170 
pgbouncer_1.7.2-65-g2b8e6cf.orig.tar.gz
 07692ae807c8f78c249eb7d3e926fa565badc15f 9076 
pgbouncer_1.7.2-65-g2b8e6cf-1.debian.tar.xz
 3623cc7647aabe3023175a7925ceda5260f73fce 5977 
pgbouncer_1.7.2-65-g2b8e6cf-1_source.buildinfo
Checksums-Sha256:
 4c2df82f46dc322fd0f7c9b340216d283106337ab6a22b6bdd7a8169a492f420 2339 
pgbouncer_1.7.2-65-g2b8e6cf-1.dsc
 eb1e5f30278ff5defda600cc60e38749226806ea7b9e53170a319729b33fe9ef 533170 
pgbouncer_1.7.2-65-g2b8e6cf.orig.tar.gz
 eb58a040ecf027a264056d6811a107f4ac3f5b918c5f045af0301568612781d6 9076 
pgbouncer_1.7.2-65-g2b8e6cf-1.debian.tar.xz
 c180e3fd12d597021fe7984d53aa336b9c626dd9a82a766a9331b00cc86d760f 5977 
pgbouncer_1.7.2-65-g2b8e6cf-1_source.buildinfo
Files:
 0515d16d1763347ee6cd200b9a2c4db0 2339 database optional 
pgbouncer_1.7.2-65-g2b8e6cf-1.dsc
 04629d1efc6a99ae8fc1bcf8791d5978 533170 database optional 
pgbouncer_1.7.2-65-g2b8e6cf.orig.tar.gz
 09c506f68bf3852e8593402ff727 9076 database optional 
pgbouncer_1.7.2-65-g2b8e6cf-1.debian.tar.xz
 83bb90e3c296d3911852e793bc829ac5 5977 database optional 
pgbouncer_1.7.2-65-g2b8e6cf-1_source.buildinfo

-BEGIN PGP SIGNATURE-
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Bug#881149: htslib FTBFS: test failures on i386

2017-11-18 Thread Graham Inggs
Another FWIW, building on i386 with -O1 instead of -O2 and dropping
-fno-strict-aliasing is successful.

Where can one find the differences between -O1 and -O2 in GCC 7?
What changed between GCC 6 and 7 would be useful too.


--- a/debian/rules
+++ b/debian/rules
@@ -7,7 +7,10 @@

 include /usr/share/dpkg/default.mk

-export DEB_CFLAGS_MAINT_APPEND = -fno-strict-aliasing
+ifneq (,$(filter $(DEB_HOST_ARCH),i386))
+  export DEB_CFLAGS_MAINT_STRIP=-O2
+  export DEB_CFLAGS_MAINT_APPEND=-O1
+endif

 %:
 dh $@



Bug#784449: Porting AcetoneISO to Qt5

2017-11-18 Thread Matija Skala
AcetoneISO can be ported to Qt5 by simply executing the following commands 
inside the source code:

sed -i 's/QtGui/QtWidgets/' sources/*
sed -i 's/getInteger/getInt/' sources/*
sed -i 's/WFlags/WindowFlags/' sources/*
sed -i 's/webkit/webkitwidgets/' acetoneiso.pro
sed -i 's/TARGET = /TARGET = acetoneiso/' acetoneiso.pro
sed -i 's/QT += phonon/LIBS += -lphonon4qt5/' acetoneiso.pro
sed -i 's@INCLUDEPATH.*$@& /usr/include/phonon4qt5/KDE@' acetoneiso.pro



Bug#881857: add CVE

2017-11-18 Thread Salvatore Bonaccorso
Hi

On Fri, Nov 17, 2017 at 05:43:54PM +0100, Ferenc Wágner wrote:
> Salvatore Bonaccorso  writes:
> 
> > Thanks, need to check why my mail for 881857 did not went trough
> > (since I retitled both with the CVE assignments).
> 
> I think you used the same bug number in both.

Oh wow, that's sort of higly embarassing. Apologies about that :(

> Now, this is still ongoing:
> https://release.debian.org/transitions/html/auto-xerces-c.html
> The upstream fixes for this issue appeared as new patch level releases
> for XMLTooling (1.6.2), OpenSAML (2.6.1) and the SP (2.6.1).  Shall I
> wait for the transition to finish before uploading them?

It's honestly not something I can advise with the security team hat
on. But since the transition is ongoing it's probably best to wait
until the transition has happened. But alternatively ask the release
team if it's fine to upload a targetted fix with urgency=high and do a
new upstream import possibly just later to avoid blocking the
tranisition in case some problems arise with the new upstream imported
versions.

Please do not take above with care, best is to have import from
release team to not block their work on transition.

Regards,
Salvatore



Bug#866676: Pending fixes for bugs in the libxml-libxml-perl package

2017-11-18 Thread pkg-perl-maintainers
tag 866676 + pending
thanks

Some bugs in the libxml-libxml-perl package are closed in revision
e8045d7ace37ba952f0fa3cc8ca6281a9d20b8a5 in branch ' 
jessie-security' by Salvatore Bonaccorso

The full diff can be seen at
https://anonscm.debian.org/cgit/pkg-perl/packages/libxml-libxml-perl.git/commit/?id=e8045d7

Commit message:

CVE-2017-10672: Use-after-free by controlling the arguments to a 
replaceChild call

Closes: #866676



Processed: Pending fixes for bugs in the libxml-libxml-perl package

2017-11-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tag 866676 + pending
Bug #866676 {Done: Salvatore Bonaccorso } 
[src:libxml-libxml-perl] libxml-libxml-perl: CVE-2017-10672: Use-after-free in 
XML::LibXML::Node::replaceChild
Ignoring request to alter tags of bug #866676 to the same tags previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
866676: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=866676
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#824827: mixmaster: hold on..

2017-11-18 Thread Nomen Nescio
Package: mixmaster
Version: 3.0.0-8.1
Followup-For: Bug #824827

Dear Maintainer,

> The bug reporter is incorrect about the status of mixmaster, it's
> not designed to use 4k keys so it is hardly surprising that it fails
> when you try to use them.

You continue to misunderstand the bug report.  This is not a feature
request for 4k key support.

The bug is that mixmaster selects incompatible (4k key) remailers for
the chain, it means 4k keys are /partially/ supported (a very bad
idea).  In order to function, the support must be entirely one way or
the other.

These two bugs still remain:

bug 1: mixmaster autonomously chooses to use a (so-called) unsupported
   chain.  If 4k keys are not supported, the tool shouldn't
   attempt to chain through unusable nodes in the first place.

bug 2: the error message "encryption failed" is absurdly vague.  In
the absence of a fix for bug 1, the tool should say something
meaningful like:

  "cannot route through dizum because its keys are too large"

> The project is effectively dead upstream and has been for some time.
> This is mostly because it is no longer secure. It is for this reason
> that I recommend it's removal.

A stale upstream project is not necessarily a reason to remove a
downstream project (an upstream project may be sufficiently stable).
However, persistence of the above-mentioned defects are good cause for
removal.



Bug#881445: marked as pending

2017-11-18 Thread Cédric Boutillier
tag 881445 pending
thanks

Hello,

Bug #881445 reported by you has been fixed in the Git repository. You can
see the changelog below, and you can check the diff of the fix at:


https://anonscm.debian.org/cgit/pkg-ruby-extras/ruby-ox.git/commit/?id=e4020d4

---
commit e4020d4e4c45e863e36894751b771f2c17a4cdeb
Author: Cédric Boutillier 
Date:   Thu Nov 16 23:59:28 2017 +0100

prepare changelog

diff --git a/debian/changelog b/debian/changelog
index bf15abb..9e6868c 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,17 @@
+ruby-ox (2.8.2-1) unstable; urgency=medium
+
+  * New upstream version 2.8.2
++ fix CVE-2017-15928: segmentation fault in parse_obj
+  (Closes: #881445)
+  * Remove version in the gem2deb build-dependency
+  * Use https:// in Vcs-* fields
+  * Run wrap-and-sort on packaging files
+  * Bump Standards-Version to 4.1.1 (no changes needed)
+  * Bump debhelper compatibility level to 10
+  * Refresh 000-fix-so-load-path.patch
+
+ -- Cédric Boutillier   Sat, 18 Nov 2017 15:04:44 +0100
+
 ruby-ox (2.1.1-2) unstable; urgency=medium
 
   * Team upload.



Processed: Bug#881445 marked as pending

2017-11-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tag 881445 pending
Bug #881445 [src:ruby-ox] ruby-ox: CVE-2017-15928: Segmentation fault in the 
parse_obj
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
881445: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881445
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#824827: mixmaster: hold on..

2017-11-18 Thread Colin Tuckley
On 18/11/17 14:04, Nomen Nescio wrote:

> You continue to misunderstand the bug report.  This is not a feature
> request for 4k key support.

I know that. What you fail to realise is that the mixmaster
*specification* makes no mention of 4k keys!



Bug#881630: vdr-plugin-xineliboutput: FTBFS with multiarchified xine-lib-1.2 >= 1.2.6-2

2017-11-18 Thread Holger Schröder

works :)

thanks...



Bug#881445: marked as done (ruby-ox: CVE-2017-15928: Segmentation fault in the parse_obj)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 15:06:17 +
with message-id 
and subject line Bug#881445: fixed in ruby-ox 2.8.2-1
has caused the Debian Bug report #881445,
regarding ruby-ox: CVE-2017-15928: Segmentation fault in the parse_obj
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
881445: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881445
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ruby-ox
Version: 2.1.1-2
Severity: grave
Tags: security upstream
Forwarded: https://github.com/ohler55/ox/issues/194

Hi,

the following vulnerability was published for ruby-ox.

Rationale for RC severity: think the issue warrants to be adressed for
the next stable release. The issue itself possibly though does not
warrant a DSA on it's own for stretch and jessie.

CVE-2017-15928[0]:
| In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation
| fault when a crafted input is supplied to parse_obj. NOTE: the vendor
| has stated "Ox should handle the error more gracefully" but has not
| confirmed a security implication.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-15928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15928
[1] https://github.com/ohler55/ox/issues/194
[2] 
https://github.com/ohler55/ox/commit/e4565dbc167f0d38c3f93243d7a4fcfc391cbfc8

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: ruby-ox
Source-Version: 2.8.2-1

We believe that the bug you reported is fixed in the latest version of
ruby-ox, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 881...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Cédric Boutillier  (supplier of updated ruby-ox package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 18 Nov 2017 15:04:44 +0100
Source: ruby-ox
Binary: ruby-ox
Architecture: source
Version: 2.8.2-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers 

Changed-By: Cédric Boutillier 
Description:
 ruby-ox- fast XML parser and object serializer
Closes: 881445
Changes:
 ruby-ox (2.8.2-1) unstable; urgency=medium
 .
   * New upstream version 2.8.2
 + fix CVE-2017-15928: segmentation fault in parse_obj
   (Closes: #881445)
   * Remove version in the gem2deb build-dependency
   * Use https:// in Vcs-* fields
   * Run wrap-and-sort on packaging files
   * Bump Standards-Version to 4.1.1 (no changes needed)
   * Bump debhelper compatibility level to 10
   * Refresh 000-fix-so-load-path.patch
Checksums-Sha1:
 4ad78c2a88cbe629c7ca068fb0b176722ab1cc68 1607 ruby-ox_2.8.2-1.dsc
 3bcb0ee7fd0d7e18c4fe67ec6296a42b3c0e0ca9 79209 ruby-ox_2.8.2.orig.tar.gz
 904b96d86ab63d8052a8603b4a2855b08e2dc9e0 3188 ruby-ox_2.8.2-1.debian.tar.xz
 3f62f2ed914c0a17f790a41a8da5e7796ccff36e 6137 ruby-ox_2.8.2-1_source.buildinfo
Checksums-Sha256:
 d55dcafa972fee1ba6e9b78bb580640151588420f718a5cdf8782f2704ce18f6 1607 
ruby-ox_2.8.2-1.dsc
 0d0bbc69677a204fbe295c3443ddb0fa893e3647b26794c3ca5d5d87ae21f6f4 79209 
ruby-ox_2.8.2.orig.tar.gz
 66ee937680c908e36bb3011db5a110b6cc5b000d5c2bd6555824e489303a838b 3188 
ruby-ox_2.8.2-1.debian.tar.xz
 76f6dca2321b06ef6dc8008eaa9b95f20948c6865e6a2f54a74702d389c1c1de 6137 
ruby-ox_2.8.2-1_source.buildinfo
Files:
 168c8852e890450d5fc1989b1b04c40d 1607 ruby optional ruby-ox_2.8.2-1.dsc
 6e16022002fe0701aafa6bfc71b2d3ae 79209 ruby optional ruby-ox_2.8.2.orig.tar.gz
 ecc166ac9a03c5d7527a14d7cf807bd8 3188 ruby optional 
ruby-ox_2.8.2-1.debian.tar.xz
 9e72028599d5c003c306fb7181cadc37 6137 ruby optional 
ruby-ox_2.8.2-1_source.buildinfo

-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEnM1rMZ2/jkCrGr0aia+CtznNIXoFAloQP8QACgkQia+CtznN
IXoM8ggAlvZTDQ3CimHdk/EIGWHNqz1QoxuAS4vk3IAIGi0Lzfb8J7wX9e4mj1ed
rIef72BcYue/uzUgwHWPEoua2H/3Wej0oR1IgZzOpTq/5w2j+SEbcBMGYI9ScMO3
shCJg3YRLJgkE7SSwQ9rRj8KdpyD/daWQS1lLy88iOTZFyfXf0ZZ21Kl+tV7e/w3
FerwHwuQfijsK4fcwT+q8f0OCO248VSGjGtkJpIyn7/lJic0ypMbg7t75bOTgWn1
hKVYthRfmgECPUU+AvsVTPbDTMwzphxusMBlFhr9W5dRmzhnAA3uYz92IMRTe1

Bug#881929: waterfox or Pale Moon?

2017-11-18 Thread Adam Borowski
Considering how completely, utterly broken new Firefox is, I have some
doubts whether it'll reach a basic level of usability before Buster.

Thus, it looks likely that someone would upload Waterfox, Pale Moon or
Basilisk, thus there's no need to haste to remove addons for non-crippled
versions of Firefox.


Meow!
-- 
⢀⣴⠾⠻⢶⣦⠀ 
⣾⠁⢰⠒⠀⣿⡁ Imagine there are bandits in your house, your kid is bleeding out,
⢿⡄⠘⠷⠚⠋⠀ the house is on fire, and seven big-ass trumpets are playing in the
⠈⠳⣄ sky.  Your cat demands food.  The priority should be obvious...



Bug#881598: marked as pending

2017-11-18 Thread Thomas Goirand
tag 881598 pending
thanks

Hello,

Bug #881598 reported by you has been fixed in the Git repository. You can
see the changelog below, and you can check the diff of the fix at:


https://anonscm.debian.org/cgit/openstack/services/ironic-inspector.git/commit/?id=5006834

---
commit 5006834e1a09cfd82adf1ceeca5eb360f1f3837f
Author: Thomas Goirand 
Date:   Sat Nov 18 15:25:19 2017 +

Changelog closes #881598

diff --git a/debian/changelog b/debian/changelog
index 355b63e..26a6447 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -7,7 +7,8 @@ ironic-inspector (6.0.0-1) unstable; urgency=medium
   * Running wrap-and-sort -bast.
   * Standards-Version: 4.1.1.
   * Deprecating priority extra as per policy 4.0.1.
-  * New upstream release.
+  * New upstream release:
+- Can (again) be installed without crashing (Closes: #881598).
   * Fixed (build-)depends for this release.
   * Rebase patch.
   * Do not add python-pydot3 and python-construct as b-d, as that's for the doc



Processed: Bug#881598 marked as pending

2017-11-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tag 881598 pending
Bug #881598 [ironic-inspector] ironic-inspector: fails to install: ValueError: 
invalid literal for int() with base 10: 'ironic_inspector.sqlite'
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
881598: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881598
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: reassign 882069 to src:python-cryptography, forcibly merging 882069 882011 ...

2017-11-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 882069 src:python-cryptography
Bug #882069 [python3-keyring] python3-keyring: ModuleNotFoundError: No module 
named '_cffi_backend'
Bug reassigned from package 'python3-keyring' to 'src:python-cryptography'.
No longer marked as found in versions python-keyring/10.4.0-1.
Ignoring request to alter fixed versions of bug #882069 to the same values 
previously set
> forcemerge 882069 882011
Bug #882069 [src:python-cryptography] python3-keyring: ModuleNotFoundError: No 
module named '_cffi_backend'
Bug #882069 [src:python-cryptography] python3-keyring: ModuleNotFoundError: No 
module named '_cffi_backend'
Marked as fixed in versions python-cryptography/2.1.3-2.
Marked as found in versions python-cryptography/2.1.3-1.
Bug #882016 {Done: Tristan Seligmann } 
[src:python-cryptography] python-cryptography: no longer depends on 
cffi-backend and enum, programs fail to start
Severity set to 'normal' from 'serious'
Severity set to 'normal' from 'serious'
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may need to re-add them.
Bug reopened
No longer marked as fixed in versions python-cryptography/2.1.3-2.
No longer marked as fixed in versions python-cryptography/2.1.3-2.
Removed indication that 882016 affects python-cryptography and 
python3-cryptography
Removed indication that 882011 affects python3-cryptography and 
python-cryptography
Bug #882011 [src:python-cryptography] python-cryptography: no longer depends on 
cffi-backend and enum, programs fail to start
Marked as fixed in versions python-cryptography/2.1.3-2.
Marked as fixed in versions python-cryptography/2.1.3-2.
Merged 882011 882016 882069
> retitle 882069 python-cryptography: missing dependencies
Bug #882069 [src:python-cryptography] python3-keyring: ModuleNotFoundError: No 
module named '_cffi_backend'
Bug #882011 [src:python-cryptography] python-cryptography: no longer depends on 
cffi-backend and enum, programs fail to start
Bug #882016 [src:python-cryptography] python-cryptography: no longer depends on 
cffi-backend and enum, programs fail to start
Changed Bug title to 'python-cryptography: missing dependencies' from 
'python3-keyring: ModuleNotFoundError: No module named '_cffi_backend''.
Changed Bug title to 'python-cryptography: missing dependencies' from 
'python-cryptography: no longer depends on cffi-backend and enum, programs fail 
to start'.
Changed Bug title to 'python-cryptography: missing dependencies' from 
'python-cryptography: no longer depends on cffi-backend and enum, programs fail 
to start'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
882011: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882011
882016: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882016
882069: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882069
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#881598: marked as done (ironic-inspector: fails to install: ValueError: invalid literal for int() with base 10: 'ironic_inspector.sqlite')

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 15:49:31 +
with message-id 
and subject line Bug#881598: fixed in ironic-inspector 6.0.0-1
has caused the Debian Bug report #881598,
regarding ironic-inspector: fails to install: ValueError: invalid literal for 
int() with base 10: 'ironic_inspector.sqlite'
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
881598: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881598
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: ironic-inspector
Version: 4.2.0-2
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package failed to install. As
per definition of the release team this makes the package too buggy for
a release, thus the severity.

>From the attached log (scroll to the bottom...):

  Selecting previously unselected package ironic-inspector.
  (Reading database ... 
(Reading database ... 16887 files and directories currently installed.)
  Preparing to unpack .../ironic-inspector_4.2.0-2_all.deb ...
  Unpacking ironic-inspector (4.2.0-2) ...
  Setting up ironic-inspector (4.2.0-2) ...
  Traceback (most recent call last):
File "/usr/bin/ironic-inspector-dbsync", line 10, in 
  sys.exit(main())
File "/usr/lib/python2.7/dist-packages/ironic_inspector/dbsync.py", line 
94, in main
  CONF.command.func(config, CONF.command.name)
File "/usr/lib/python2.7/dist-packages/ironic_inspector/dbsync.py", line 
77, in with_revision
  do_alembic_command(config, cmd, revision)
File "/usr/lib/python2.7/dist-packages/ironic_inspector/dbsync.py", line 
82, in do_alembic_command
  getattr(alembic_command, cmd)(config, *args, **kwargs)
File "/usr/lib/python2.7/dist-packages/alembic/command.py", line 254, in 
upgrade
  script.run_env()
File "/usr/lib/python2.7/dist-packages/alembic/script/base.py", line 425, 
in run_env
  util.load_python_file(self.dir, 'env.py')
File "/usr/lib/python2.7/dist-packages/alembic/util/pyfiles.py", line 93, 
in load_python_file
  module = load_module_py(module_id, path)
File "/usr/lib/python2.7/dist-packages/alembic/util/compat.py", line 75, in 
load_module_py
  mod = imp.load_source(module_id, path, fp)
File "/usr/lib/python2.7/dist-packages/ironic_inspector/migrations/env.py", 
line 18, in 
  from ironic_inspector import db
File "/usr/lib/python2.7/dist-packages/ironic_inspector/db.py", line 44, in 

  'ironic_inspector.sqlite')
File "/usr/lib/python2.7/dist-packages/oslo_db/options.py", line 193, in 
set_defaults
  conf.set_default('max_pool_size', max_pool_size, group='database')
File "/usr/lib/python2.7/dist-packages/debtcollector/removals.py", line 
261, in wrapper
  return f(*args, **kwargs)
File "/usr/lib/python2.7/dist-packages/oslo_config/cfg.py", line 2402, in 
__inner
  result = f(self, *args, **kwargs)
File "/usr/lib/python2.7/dist-packages/oslo_config/cfg.py", line 2752, in 
set_default
  opt_info['opt'], default, enforce_type)
File "/usr/lib/python2.7/dist-packages/oslo_config/cfg.py", line 2758, in 
_get_enforced_type_value
  converted = self._convert_value(value, opt)
File "/usr/lib/python2.7/dist-packages/oslo_config/cfg.py", line 3036, in 
_convert_value
  return opt.type(value)
File "/usr/lib/python2.7/dist-packages/oslo_config/types.py", line 282, in 
__call__
  value = self.num_type(value)
  ValueError: invalid literal for int() with base 10: 'ironic_inspector.sqlite'
  dpkg: error processing package ironic-inspector (--configure):
   installed ironic-inspector package post-installation script subprocess 
returned error exit status 1
  Errors were encountered while processing:
   ironic-inspector


cheers,

Andreas


ironic-inspector_4.2.0-2.log.gz
Description: application/gzip
--- End Message ---
--- Begin Message ---
Source: ironic-inspector
Source-Version: 6.0.0-1

We believe that the bug you reported is fixed in the latest version of
ironic-inspector, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 881...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Goirand  (supplier of updated ironic-inspector package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the

Processed: libxml2: diff for NMU version 2.9.4+dfsg1-5.1

2017-11-18 Thread Debian Bug Tracking System
Processing control commands:

> tags 855001 + patch
Bug #855001 [libxml2] CVE-2017-5969: libxml2: null pointer dereference when 
parsing a xml file using recover mode
Ignoring request to alter tags of bug #855001 to the same tags previously set
> tags 855001 + pending
Bug #855001 [libxml2] CVE-2017-5969: libxml2: null pointer dereference when 
parsing a xml file using recover mode
Ignoring request to alter tags of bug #855001 to the same tags previously set
> tags 878684 + patch
Bug #878684 [python3-libxml2] python3-libxml2: Import fails in Python 3 with 
error about undefined symbol
Ignoring request to alter tags of bug #878684 to the same tags previously set
> tags 878684 + pending
Bug #878684 [python3-libxml2] python3-libxml2: Import fails in Python 3 with 
error about undefined symbol
Ignoring request to alter tags of bug #878684 to the same tags previously set
> tags 88 + pending
Bug #88 [src:libxml2] libxml2: CVE-2017-5130
Ignoring request to alter tags of bug #88 to the same tags previously set

-- 
855001: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855001
878684: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878684
88: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=88
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#878684: libxml2: diff for NMU version 2.9.4+dfsg1-5.1

2017-11-18 Thread Salvatore Bonaccorso
Control: tags 855001 + patch
Control: tags 855001 + pending
Control: tags 878684 + patch
Control: tags 878684 + pending
Control: tags 88 + pending

Dear maintainer,

I've prepared an NMU for libxml2 (versioned as 2.9.4+dfsg1-5.1) and
uploaded it to DELAYED/2. Please feel free to tell me if I
should delay it longer.

Regards,
Salvatore
diff -Nru libxml2-2.9.4+dfsg1/debian/changelog libxml2-2.9.4+dfsg1/debian/changelog
--- libxml2-2.9.4+dfsg1/debian/changelog	2017-10-15 02:18:26.0 +0200
+++ libxml2-2.9.4+dfsg1/debian/changelog	2017-11-18 16:39:04.0 +0100
@@ -1,3 +1,15 @@
+libxml2 (2.9.4+dfsg1-5.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Fix NULL pointer deref in xmlDumpElementContent (CVE-2017-5969)
+(Closes: #855001)
+  * Check for integer overflow in memory debug code (CVE-2017-5130)
+(Closes: #88)
+  * Fix copy-paste errors in error messages
+  * python: remove single use of _PyVerify_fd (Closes: #878684)
+
+ -- Salvatore Bonaccorso   Sat, 18 Nov 2017 16:39:04 +0100
+
 libxml2 (2.9.4+dfsg1-5) unstable; urgency=medium
 
   * Team upload.
diff -Nru libxml2-2.9.4+dfsg1/debian/patches/0014-Fix-NULL-pointer-deref-in-xmlDumpElementContent.patch libxml2-2.9.4+dfsg1/debian/patches/0014-Fix-NULL-pointer-deref-in-xmlDumpElementContent.patch
--- libxml2-2.9.4+dfsg1/debian/patches/0014-Fix-NULL-pointer-deref-in-xmlDumpElementContent.patch	1970-01-01 01:00:00.0 +0100
+++ libxml2-2.9.4+dfsg1/debian/patches/0014-Fix-NULL-pointer-deref-in-xmlDumpElementContent.patch	2017-11-18 16:39:04.0 +0100
@@ -0,0 +1,65 @@
+From: Daniel Veillard 
+Date: Wed, 7 Jun 2017 16:47:36 +0200
+Subject: Fix NULL pointer deref in xmlDumpElementContent
+Origin: https://git.gnome.org/browse/libxml2/commit/?id=94691dc884d1a8ada39f073408b4bb92fe7fe882
+Bug-Debian: https://bugs.debian.org/855001
+Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2017-5969
+
+Can only be triggered in recovery mode.
+
+Fixes bug 758422 (CVE-2017-5969).
+---
+ valid.c | 24 ++--
+ 1 file changed, 14 insertions(+), 10 deletions(-)
+
+diff --git a/valid.c b/valid.c
+index 9b2df56a..8075d3a0 100644
+--- a/valid.c
 b/valid.c
+@@ -1172,29 +1172,33 @@ xmlDumpElementContent(xmlBufferPtr buf, xmlElementContentPtr content, int glob)
+ 	xmlBufferWriteCHAR(buf, content->name);
+ 	break;
+ 	case XML_ELEMENT_CONTENT_SEQ:
+-	if ((content->c1->type == XML_ELEMENT_CONTENT_OR) ||
+-	(content->c1->type == XML_ELEMENT_CONTENT_SEQ))
++	if ((content->c1 != NULL) &&
++	((content->c1->type == XML_ELEMENT_CONTENT_OR) ||
++	 (content->c1->type == XML_ELEMENT_CONTENT_SEQ)))
+ 		xmlDumpElementContent(buf, content->c1, 1);
+ 	else
+ 		xmlDumpElementContent(buf, content->c1, 0);
+ xmlBufferWriteChar(buf, " , ");
+-	if ((content->c2->type == XML_ELEMENT_CONTENT_OR) ||
+-	((content->c2->type == XML_ELEMENT_CONTENT_SEQ) &&
+-		 (content->c2->ocur != XML_ELEMENT_CONTENT_ONCE)))
++	if ((content->c2 != NULL) &&
++	((content->c2->type == XML_ELEMENT_CONTENT_OR) ||
++	 ((content->c2->type == XML_ELEMENT_CONTENT_SEQ) &&
++		  (content->c2->ocur != XML_ELEMENT_CONTENT_ONCE
+ 		xmlDumpElementContent(buf, content->c2, 1);
+ 	else
+ 		xmlDumpElementContent(buf, content->c2, 0);
+ 	break;
+ 	case XML_ELEMENT_CONTENT_OR:
+-	if ((content->c1->type == XML_ELEMENT_CONTENT_OR) ||
+-	(content->c1->type == XML_ELEMENT_CONTENT_SEQ))
++	if ((content->c1 != NULL) &&
++	((content->c1->type == XML_ELEMENT_CONTENT_OR) ||
++	 (content->c1->type == XML_ELEMENT_CONTENT_SEQ)))
+ 		xmlDumpElementContent(buf, content->c1, 1);
+ 	else
+ 		xmlDumpElementContent(buf, content->c1, 0);
+ xmlBufferWriteChar(buf, " | ");
+-	if ((content->c2->type == XML_ELEMENT_CONTENT_SEQ) ||
+-	((content->c2->type == XML_ELEMENT_CONTENT_OR) &&
+-		 (content->c2->ocur != XML_ELEMENT_CONTENT_ONCE)))
++	if ((content->c2 != NULL) &&
++	((content->c2->type == XML_ELEMENT_CONTENT_SEQ) ||
++	 ((content->c2->type == XML_ELEMENT_CONTENT_OR) &&
++		  (content->c2->ocur != XML_ELEMENT_CONTENT_ONCE
+ 		xmlDumpElementContent(buf, content->c2, 1);
+ 	else
+ 		xmlDumpElementContent(buf, content->c2, 0);
+-- 
+2.15.0
+
diff -Nru libxml2-2.9.4+dfsg1/debian/patches/0015-Check-for-integer-overflow-in-memory-debug-code.patch libxml2-2.9.4+dfsg1/debian/patches/0015-Check-for-integer-overflow-in-memory-debug-code.patch
--- libxml2-2.9.4+dfsg1/debian/patches/0015-Check-for-integer-overflow-in-memory-debug-code.patch	1970-01-01 01:00:00.0 +0100
+++ libxml2-2.9.4+dfsg1/debian/patches/0015-Check-for-integer-overflow-in-memory-debug-code.patch	2017-11-18 16:39:04.0 +0100
@@ -0,0 +1,63 @@
+From: Nick Wellnhofer 
+Date: Tue, 6 Jun 2017 13:21:14 +0200
+Subject: Check for integer overflow in memory debug code
+Origin: https://git.gnome.org/browse/libxml2/commit/?id=897dffba

Processed: libxml2: diff for NMU version 2.9.4+dfsg1-5.1

2017-11-18 Thread Debian Bug Tracking System
Processing control commands:

> tags 855001 + patch
Bug #855001 [libxml2] CVE-2017-5969: libxml2: null pointer dereference when 
parsing a xml file using recover mode
Ignoring request to alter tags of bug #855001 to the same tags previously set
> tags 855001 + pending
Bug #855001 [libxml2] CVE-2017-5969: libxml2: null pointer dereference when 
parsing a xml file using recover mode
Ignoring request to alter tags of bug #855001 to the same tags previously set
> tags 878684 + patch
Bug #878684 [python3-libxml2] python3-libxml2: Import fails in Python 3 with 
error about undefined symbol
Ignoring request to alter tags of bug #878684 to the same tags previously set
> tags 878684 + pending
Bug #878684 [python3-libxml2] python3-libxml2: Import fails in Python 3 with 
error about undefined symbol
Ignoring request to alter tags of bug #878684 to the same tags previously set
> tags 88 + pending
Bug #88 [src:libxml2] libxml2: CVE-2017-5130
Ignoring request to alter tags of bug #88 to the same tags previously set

-- 
855001: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855001
878684: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878684
88: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=88
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: libxml2: diff for NMU version 2.9.4+dfsg1-5.1

2017-11-18 Thread Debian Bug Tracking System
Processing control commands:

> tags 855001 + patch
Bug #855001 [libxml2] CVE-2017-5969: libxml2: null pointer dereference when 
parsing a xml file using recover mode
Added tag(s) patch.
> tags 855001 + pending
Bug #855001 [libxml2] CVE-2017-5969: libxml2: null pointer dereference when 
parsing a xml file using recover mode
Added tag(s) pending.
> tags 878684 + patch
Bug #878684 [python3-libxml2] python3-libxml2: Import fails in Python 3 with 
error about undefined symbol
Added tag(s) patch.
> tags 878684 + pending
Bug #878684 [python3-libxml2] python3-libxml2: Import fails in Python 3 with 
error about undefined symbol
Added tag(s) pending.
> tags 88 + pending
Bug #88 [src:libxml2] libxml2: CVE-2017-5130
Added tag(s) pending.

-- 
855001: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855001
878684: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878684
88: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=88
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Bug#881986 marked as pending

2017-11-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tag 881986 pending
Bug #881986 [src:python-kafka] python-kafka FTBFS with python-lz4 0.10.1
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
881986: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881986
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#881986: marked as pending

2017-11-18 Thread Thomas Goirand
tag 881986 pending
thanks

Hello,

Bug #881986 reported by you has been fixed in the Git repository. You can
see the changelog below, and you can check the diff of the fix at:


https://anonscm.debian.org/cgit/openstack/python/python-kafka.git/commit/?id=5b85859

---
commit 5b858592150e85ba1efa62ec485e3ab1358a4669
Author: Thomas Goirand 
Date:   Fri Nov 17 12:11:16 2017 +

Add remove-old-lz4-test.patch (Closes: #881986).

diff --git a/debian/changelog b/debian/changelog
index 5633ec7..4b53927 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,9 @@
+python-kafka (1.3.3-3) unstable; urgency=medium
+
+  * Add remove-old-lz4-test.patch (Closes: #881986).
+
+ -- Thomas Goirand   Fri, 17 Nov 2017 12:11:12 +
+
 python-kafka (1.3.3-2) unstable; urgency=medium
 
   * Uploading to unstable (Closes: #834033).



Bug#882075: ffmpeg: sometimes FTBFS on i386

2017-11-18 Thread James Cowgill
Source: ffmpeg
Version: 7:3.4-1
Severity: serious
Tags: sid buster

And just after I upload 3.4-3...

ffmpeg 3.4 sometimes FTBFS on i386, possibly due to some hardware
specific thing. It has worked on the buildds so far, but sometimes fails
on the ubuntu builders and in reproducible builds with checkasm errors
(although often rebuilding helps):

> Test checkasm-float_dsp failed. Look at 
> tests/data/fate/checkasm-float_dsp.err for details.
> checkasm: using random seed 2642491962
> SSE:
>  - float_dsp.vector_fmul [OK]
>  - float_dsp.vector_fmac [OK]
>  - float_dsp.butterflies_float   [OK]
>  - float_dsp.scalarproduct_float [OK]
> 93: -53.395181798898 - -53.395181798898 = -7.1054273576e-15
> SSE2:
>vector_dmul_scalar_sse2 (float_dsp.c:171)
>  - float_dsp.vector_dmul [FAILED]
>  - float_dsp.vector_dmac [OK]
> AVX:
>  - float_dsp.vector_fmul [OK]
>  - float_dsp.vector_fmac [OK]
>  - float_dsp.vector_dmul [OK]
>  - float_dsp.vector_dmac [OK]
> FMA3:
>  - float_dsp.vector_fmul [OK]
>  - float_dsp.vector_fmac [OK]
>  - float_dsp.vector_dmac [OK]
> AVX2:
>  - float_dsp.vector_fmul [OK]
> checkasm: 1 of 20 tests have failed
> /build/1st/ffmpeg-3.4/tests/Makefile:225: recipe for target 
> 'fate-checkasm-float_dsp' failed

James



signature.asc
Description: OpenPGP digital signature


Bug#881986: marked as done (python-kafka FTBFS with python-lz4 0.10.1)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 16:19:26 +
with message-id 
and subject line Bug#881986: fixed in python-kafka 1.3.3-3
has caused the Debian Bug report #881986,
regarding python-kafka FTBFS with python-lz4 0.10.1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
881986: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881986
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: python-kafka
Version: 1.3.3-2
Severity: serious

https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/python-kafka.html

...
=== FAILURES ===
_ test_lz4_old _

@pytest.mark.skipif(not has_lz4() or platform.python_implementation() == 
'PyPy',
reason="python-lz4 crashes on old versions of pypy")
def test_lz4_old():
for i in xrange(1000):
b1 = random_string(100).encode('utf-8')
>   b2 = lz4_decode_old_kafka(lz4_encode_old_kafka(b1))

test/test_codec.py:101: 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 

payload = 
'eEHdGSeNDtPGdsFoZBWbyPtfiLuqDexMGJjalmLGbflCQlRlJSUkIOlNjprhcByztKullDShkZWcZmimcirvBRYfVAaABLjGAaPy'

def lz4_encode_old_kafka(payload):
"""Encode payload for 0.8/0.9 brokers -- requires an incorrect header 
checksum."""
>   assert xxhash is not None
E   AssertionError

kafka/codec.py:229: AssertionError
== 1 failed, 231 passed, 81 skipped in 21.66 seconds ===
debian/rules:14: recipe for target 'override_dh_auto_test' failed
make[1]: *** [override_dh_auto_test] Error 1
--- End Message ---
--- Begin Message ---
Source: python-kafka
Source-Version: 1.3.3-3

We believe that the bug you reported is fixed in the latest version of
python-kafka, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 881...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Goirand  (supplier of updated python-kafka package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 17 Nov 2017 12:11:12 +
Source: python-kafka
Binary: python-kafka python-kafka-doc python3-kafka
Architecture: source all
Version: 1.3.3-3
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenStack 
Changed-By: Thomas Goirand 
Description:
 python-kafka - Pure Python client for Apache Kafka - Python 2.x
 python-kafka-doc - Pure Python client for Apache Kafka - doc
 python3-kafka - Pure Python client for Apache Kafka - Python 3.x
Closes: 881986
Changes:
 python-kafka (1.3.3-3) unstable; urgency=medium
 .
   * Add remove-old-lz4-test.patch (Closes: #881986).
Checksums-Sha1:
 5ab09511e09bcd3900069bca4775d8eb460613f6 2533 python-kafka_1.3.3-3.dsc
 42d0203b190495876289dad52aa19f6f8c5eb01b 4900 
python-kafka_1.3.3-3.debian.tar.xz
 88adabb3a1757632a1e17b38447d4256e37ed964 216072 
python-kafka-doc_1.3.3-3_all.deb
 a4d578e323682ef0dc4d7822929d6101ff82d808 140636 python-kafka_1.3.3-3_all.deb
 1417cd870dfdeaf9b2cd21b63577d4e75df65e9f 10124 
python-kafka_1.3.3-3_amd64.buildinfo
 360bf8cef59437a64995d68417b012142406d48f 140724 python3-kafka_1.3.3-3_all.deb
Checksums-Sha256:
 37f3c051ef025ade1a67e85ee10ba2bd85125ad212b88bc06b0e3df2c7ad1aff 2533 
python-kafka_1.3.3-3.dsc
 678cb957f5ca9432393a2884299b2ec160850757b18a24a8fd19c74d1c496dde 4900 
python-kafka_1.3.3-3.debian.tar.xz
 77d1f7b45f32790b7ca3bb3cbf1773a65236141718363a7f0b420689c1c9834e 216072 
python-kafka-doc_1.3.3-3_all.deb
 1dc5535a4fac6f12d1cc102608632720556c2b949e77f03f44550e7909e136c4 140636 
python-kafka_1.3.3-3_all.deb
 395cf8064d0dda6d20b4111b03215fe089acd9ce34cff1b6de92e8de30ba8438 10124 
python-kafka_1.3.3-3_amd64.buildinfo
 15fe0389e9ce4f64414297c46ffaac32802b1c9b948ee37a952f7c47cecf2291 140724 
python3-kafka_1.3.3-3_all.deb
Files:
 939b2eb036e1badd1b8d29a39e90defd 2533 python optional python-kafka_1.3.3-3.dsc
 c89b1b55a26ed20d974cc261ac2300d6 4900 python optional 
python-kafka_1.3.3-3.debian.tar.xz
 56fe23db8909c199174a4a7f8da3e17e 216072 doc optional 
python-kafka-doc_1.3.3-3_all.deb
 5b77acd5c3387dca962ed0bf50a35c93 14063

Bug#879071: fixed in 0ad 0.0.22-2

2017-11-18 Thread Ludovic Rousseau
Hello,

2017-11-18 6:21 GMT+01:00 Petter Reinholdtsen :

> [Ludovic Rousseau]
> >  0ad (0.0.22-2) unstable; urgency=medium
> >  .
> >* Fix "0ad FTBFS with on armhf with gcc 7: error: call of overloaded
> >  'abs(unsigned int)' is ambiguous" by removing support of armhf
> >  (Closes: #879071)
>
> Note, this "fix" did not work, as there are armhf binaries in the archive
> and the new version is not allowed to propagate into testing until the
> armhf binaries are updated to the latest version or removed.  Did you
> file a request for removal?
>

Adrian Bunk filed bug #880058 "RM: 0ad [armhf] -- NBS; no longer built on
armhf"

I am not sure it will be enough since the versions for arm64,
kfreebsd-amd64 and kfreebsd-i386 must also be removed.
Should I create 3 new bugs for the other 3 architectures?

This bug just caused 0ad to be removed from testing.
>

Yes. I saw that.
Thanks

-- 
 Dr. Ludovic Rousseau


Bug#879071: fixed in 0ad 0.0.22-2

2017-11-18 Thread James Cowgill
Hi,

On 18/11/17 16:21, Ludovic Rousseau wrote:
> Hello,
> 
> 2017-11-18 6:21 GMT+01:00 Petter Reinholdtsen :
> 
>> [Ludovic Rousseau]
>>>  0ad (0.0.22-2) unstable; urgency=medium
>>>  .
>>>* Fix "0ad FTBFS with on armhf with gcc 7: error: call of overloaded
>>>  'abs(unsigned int)' is ambiguous" by removing support of armhf
>>>  (Closes: #879071)
>>
>> Note, this "fix" did not work, as there are armhf binaries in the archive
>> and the new version is not allowed to propagate into testing until the
>> armhf binaries are updated to the latest version or removed.  Did you
>> file a request for removal?
>>
> 
> Adrian Bunk filed bug #880058 "RM: 0ad [armhf] -- NBS; no longer built on
> armhf"
> 
> I am not sure it will be enough since the versions for arm64,
> kfreebsd-amd64 and kfreebsd-i386 must also be removed.
> Should I create 3 new bugs for the other 3 architectures?

You can just retitle the original bug, with a message explaining the
situation (assuming it isn't closed before then).

Currently we have:
 0ad | 0.0.21-2  | stretch | source, amd64, armhf, i386
 0ad | 0.0.21-2  | sid | source, armhf, kfreebsd-amd64, kfreebsd-i386
 0ad | 0.0.22-3  | sid | source, amd64, i386

So I think only armhf and kfreebsd-* need removing (not arm64). kfreebsd
doesn't affect testing migration in any case.

Thanks,
James



signature.asc
Description: OpenPGP digital signature


Bug#881915: libidn FTBFS with gtk-doc-tools 1.26: gtkdoc-mktmpl is no longer available

2017-11-18 Thread Adrian Bunk
On Sat, Nov 18, 2017 at 09:36:58AM +0100, Helmut Grohne wrote:
>...
> +override_dh_autoreconf:
> + rm -f gtk-doc.make
> + gtkdocize
> + dh_autoreconf
>...

The "rm -f gtk-doc.make" has to be done when cleaning,
not in autoreconf.

cu
Adrian

-- 

   "Is there not promise of rain?" Ling Tan asked suddenly out
of the darkness. There had been need of rain for many days.
   "Only a promise," Lao Er said.
   Pearl S. Buck - Dragon Seed



Bug#879071: fixed in 0ad 0.0.22-2

2017-11-18 Thread Ludovic Rousseau
2017-11-18 17:28 GMT+01:00 James Cowgill :

> Hi,
>
> On 18/11/17 16:21, Ludovic Rousseau wrote:
> > Hello,
> >
> > 2017-11-18 6:21 GMT+01:00 Petter Reinholdtsen :
> >
> >> [Ludovic Rousseau]
> >>>  0ad (0.0.22-2) unstable; urgency=medium
> >>>  .
> >>>* Fix "0ad FTBFS with on armhf with gcc 7: error: call of overloaded
> >>>  'abs(unsigned int)' is ambiguous" by removing support of armhf
> >>>  (Closes: #879071)
> >>
> >> Note, this "fix" did not work, as there are armhf binaries in the
> archive
> >> and the new version is not allowed to propagate into testing until the
> >> armhf binaries are updated to the latest version or removed.  Did you
> >> file a request for removal?
> >>
> >
> > Adrian Bunk filed bug #880058 "RM: 0ad [armhf] -- NBS; no longer built on
> > armhf"
> >
> > I am not sure it will be enough since the versions for arm64,
> > kfreebsd-amd64 and kfreebsd-i386 must also be removed.
> > Should I create 3 new bugs for the other 3 architectures?
>
> You can just retitle the original bug, with a message explaining the
> situation (assuming it isn't closed before then).
>
> Currently we have:
>  0ad | 0.0.21-2  | stretch | source, amd64, armhf, i386
>  0ad | 0.0.21-2  | sid | source, armhf, kfreebsd-amd64, kfreebsd-i386
>  0ad | 0.0.22-3  | sid | source, amd64, i386
>
> So I think only armhf and kfreebsd-* need removing (not arm64). kfreebsd
> doesn't affect testing migration in any case.
>

So bug #880058, as it is, will remove the armhf version and 0ad should then
be able to migrate to testing.
I should _not_ file new bugs. Exact?

Thanks

-- 
 Dr. Ludovic Rousseau


Bug#882052: byte-buddy: missing build dependency on libeclipse-aether-java

2017-11-18 Thread Emmanuel Bourg
Good catch. Actually it should depend on maven-resolver, eclipse-aether is 
about to be removed.
Emmanuel Bourg



Bug#859786: marked as done (vtun: Please migrate to openssl1.1 in Buster)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 17:20:59 +
with message-id 
and subject line Bug#859786: fixed in vtun 3.0.3-4
has caused the Debian Bug report #859786,
regarding vtun: Please migrate to openssl1.1 in Buster
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
859786: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859786
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: vtun
Version: 3.0.3-3
Severity: important
Tags: sid buster
User: pkg-openssl-de...@lists.alioth.debian.org
Usertags: openssl-1.1-trans

Please migrate to libssl-dev in the Buster cycle. The bug report about
the FTBFS is #828596. The log of the FTBFS can be found at

https://breakpoint.cc/openssl-1.1-rebuild-2016-05-29/Attempted/vtun_3.0.3-2.2_amd64-20160529-1551

Sebastian
--- End Message ---
--- Begin Message ---
Source: vtun
Source-Version: 3.0.3-4

We believe that the bug you reported is fixed in the latest version of
vtun, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 859...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Adam Borowski  (supplier of updated vtun package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 18 Nov 2017 17:38:39 +0100
Source: vtun
Binary: vtun
Architecture: source
Version: 3.0.3-4
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group 
Changed-By: Adam Borowski 
Description:
 vtun   - virtual tunnel over TCP/IP networks
Closes: 859786
Changes:
 vtun (3.0.3-4) unstable; urgency=medium
 .
   * QA upload.
   * Fix FTBFS with OpenSSL 1.1 and switch to it, patch by Chris West.
 Closes: #859786.
   * dh compat 10.
Checksums-Sha1:
 86d8b8374e1f80427321c21961bb89a2899276c4 1768 vtun_3.0.3-4.dsc
 8c10a36b1a08d5a34c0493361af88ada41dfea6c 27588 vtun_3.0.3-4.debian.tar.xz
 ffb41d8b04d7a21c112da0560e1db853d70cc478 5344 vtun_3.0.3-4_source.buildinfo
Checksums-Sha256:
 4a668cf73311729bf41ea2c48c116c5bbf3084e3257479b11866b7531e56a05a 1768 
vtun_3.0.3-4.dsc
 282ee44b58c182bc23b18a8d6e4fb36d07e3cc2b3a2b742c9695391cee52bd04 27588 
vtun_3.0.3-4.debian.tar.xz
 2bfd6786e6d721f08c1936b9f0d8ad3efa06d05836e551218b1e1700a4e5d2c9 5344 
vtun_3.0.3-4_source.buildinfo
Files:
 fb934f0f4e744946aceea297c954bddd 1768 net optional vtun_3.0.3-4.dsc
 b0f31102381fac82c29597f2b5b56165 27588 net optional vtun_3.0.3-4.debian.tar.xz
 1ccd089ca6312683250eb1b5166612cd 5344 net optional 
vtun_3.0.3-4_source.buildinfo

-BEGIN PGP SIGNATURE-

iQJIBAEBCgAyFiEEkjZVexcMh/iCHArDweDZLphvfH4FAloQYmAUHGtpbG9ieXRl
QGFuZ2JhbmQucGwACgkQweDZLphvfH4AXBAAwf/Lm1y9N1KmvTswNyJoJGEA2zIe
rc77CPPlz0cPcXBCgnoV099hwpcFosWOjE1ocDNnqXwIZhXi3Tr0d8v1nsGwrO0P
XLlLw5c4yq46r+SFr8hX3R/Oee+/rHCJvqaBm/umbw2Wqq04Ff47it022go3+Ouc
mS52LdqL+om0Sxfka0dOz+t0fUVF8nF0LnibbiqP44LJGv0D5zbAsp5UuDop3uRs
dMSkECKIBtbXpmaTOX3vgevQxuno1C5vtFwDjKv4gq4MNVGscw+Dis+wQmOWrOSC
9IA68FTTmpCnD5f7ZEEKUxSrRsmHUH6v3C6Wn3B898K6ErUYM9LRuxnN4KnOwVNN
gwmyUcD1ZEAiW1z7Fj1+QPfJ5bLskkbQ2PbciUDYIDREU3/vuFoPUMbQWVRCdlEg
UEpauDtHjMWwbppxPnIiewuWcAyv17j/9WMgri5byh1RBdSPDNoxiEdoUy6O3wdh
3QfZhQ/lddyQfyhfSi5IHLsOuedeq+Nkw0pS1yZnRkXU7jv/0Jp4KA5d9AqnKeLG
85Mgc9X/yJbB1S12WH4pTlunw55rRXQoLsYpEB3t85UnTQ2lZMc5ukfJ9MAhKdld
NVijmRbvzIQPSoWeJgeqfNdmlQ/8xkZFBi2v/Y2qUo+en95DjXyzn1mAQIjcg+Eg
JbJg4WnC7EauKeQ=
=9lL5
-END PGP SIGNATURE End Message ---


Bug#864927: marked as done (kde-l10n-sr and plasma-desktop-data: error when trying to install together)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 18:07:10 +
with message-id 
and subject line Bug#864927: fixed in kde-l10n 4:16.04.3-2
has caused the Debian Bug report #864927,
regarding kde-l10n-sr and plasma-desktop-data: error when trying to install 
together
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
864927: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864927
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: plasma-desktop-data,kde-l10n-sr
Version: plasma-desktop-data/4:5.8.7.1-1
Version: kde-l10n-sr/4:16.04.3-1
Severity: serious
User: trei...@debian.org
Usertags: edos-file-overwrite

Date: 2017-06-17
Architecture: amd64
Distribution: sid

Hi,

automatic installation tests of packages that share a file and at the
same time do not conflict by their package dependency relationships has
detected the following problem:


Selecting previously unselected package liblz4-1:amd64.
(Reading database ... 11003 files and directories currently installed.)
Preparing to unpack .../liblz4-1_0.0~r131-2+b1_amd64.deb ...
Unpacking liblz4-1:amd64 (0.0~r131-2+b1) ...
Processing triggers for libc-bin (2.24-11) ...
Setting up liblz4-1:amd64 (0.0~r131-2+b1) ...
Processing triggers for libc-bin (2.24-11) ...
Selecting previously unselected package gcc-6-base:amd64.
(Reading database ... 11009 files and directories currently installed.)
Preparing to unpack .../gcc-6-base_6.3.0-18_amd64.deb ...
Unpacking gcc-6-base:amd64 (6.3.0-18) ...
Setting up gcc-6-base:amd64 (6.3.0-18) ...
(Reading database ... 11016 files and directories currently installed.)
Preparing to unpack .../aptitude_0.8.7-1_amd64.deb ...
Unpacking aptitude (0.8.7-1) over (0.6.10-1) ...
Preparing to unpack .../aptitude-common_0.8.7-1_all.deb ...
Unpacking aptitude-common (0.8.7-1) over (0.6.10-1) ...
Selecting previously unselected package libboost-system1.62.0:amd64.
Preparing to unpack .../libboost-system1.62.0_1.62.0+dfsg-4_amd64.deb ...
Unpacking libboost-system1.62.0:amd64 (1.62.0+dfsg-4) ...
Selecting previously unselected package libboost-filesystem1.62.0:amd64.
Preparing to unpack .../libboost-filesystem1.62.0_1.62.0+dfsg-4_amd64.deb ...
Unpacking libboost-filesystem1.62.0:amd64 (1.62.0+dfsg-4) ...
Selecting previously unselected package libboost-iostreams1.62.0:amd64.
Preparing to unpack .../libboost-iostreams1.62.0_1.62.0+dfsg-4_amd64.deb ...
Unpacking libboost-iostreams1.62.0:amd64 (1.62.0+dfsg-4) ...
Processing triggers for man-db (2.7.6.1-2) ...
Processing triggers for libc-bin (2.24-11) ...
(Reading database ... 11028 files and directories currently installed.)
Removing libcwidget3:amd64 (0.5.17-1) ...
Removing libsigc++-2.0-0c2a:amd64 (2.4.1-1) ...
Selecting previously unselected package libsigc++-2.0-0v5:amd64.
(Reading database ... 10975 files and directories currently installed.)
Preparing to unpack .../libsigc++-2.0-0v5_2.10.0-1_amd64.deb ...
Unpacking libsigc++-2.0-0v5:amd64 (2.10.0-1) ...
Selecting previously unselected package libcwidget3v5:amd64.
Preparing to unpack .../libcwidget3v5_0.5.17-4+b1_amd64.deb ...
Unpacking libcwidget3v5:amd64 (0.5.17-4+b1) ...
Selecting previously unselected package libxapian30:amd64.
Preparing to unpack .../libxapian30_1.4.3-2_amd64.deb ...
Unpacking libxapian30:amd64 (1.4.3-2) ...
Preparing to unpack .../libstdc++6_6.3.0-18_amd64.deb ...
Unpacking libstdc++6:amd64 (6.3.0-18) over (4.8.2-19) ...
Processing triggers for libc-bin (2.24-11) ...
Setting up libstdc++6:amd64 (6.3.0-18) ...
Processing triggers for libc-bin (2.24-11) ...
Selecting previously unselected package libapt-inst2.0:amd64.
(Reading database ... 11050 files and directories currently installed.)
Preparing to unpack .../libapt-inst2.0_1.4.6_amd64.deb ...
Unpacking libapt-inst2.0:amd64 (1.4.6) ...
Selecting previously unselected package libdb5.3:amd64.
Preparing to unpack .../libdb5.3_5.3.28-12+b1_amd64.deb ...
Unpacking libdb5.3:amd64 (5.3.28-12+b1) ...
Preparing to unpack .../apt-utils_1.4.6_amd64.deb ...
Unpacking apt-utils (1.4.6) over (0.9.15.5) ...
Preparing to unpack .../archives/apt_1.4.6_amd64.deb ...
Unpacking apt (1.4.6) over (1.0.4) ...
Selecting previously unselected package libapt-pkg5.0:amd64.
Preparing to unpack .../libapt-pkg5.0_1.4.6_amd64.deb ...
Unpacking libapt-pkg5.0:amd64 (1.4.6) ...
Processing triggers for libc-bin (2.24-11) ...
Processing triggers for man-db (2.7.6.1-2) ...
Setting up libapt-pkg5.0:amd64 (1.4.6) ...
Processing triggers for libc-bin (2.24-11) ...
Selecting previously unselected package libdouble-conversion1:amd64.
(Reading database ... 11169 files and directories currently insta

Bug#879071: fixed in 0ad 0.0.22-2

2017-11-18 Thread James Cowgill
Hi,

On 18/11/17 16:41, Ludovic Rousseau wrote:
> 2017-11-18 17:28 GMT+01:00 James Cowgill :
>> On 18/11/17 16:21, Ludovic Rousseau wrote:
>>> 2017-11-18 6:21 GMT+01:00 Petter Reinholdtsen :
>>>
 [Ludovic Rousseau]
>  0ad (0.0.22-2) unstable; urgency=medium
>  .
>* Fix "0ad FTBFS with on armhf with gcc 7: error: call of overloaded
>  'abs(unsigned int)' is ambiguous" by removing support of armhf
>  (Closes: #879071)

 Note, this "fix" did not work, as there are armhf binaries in the
>> archive
 and the new version is not allowed to propagate into testing until the
 armhf binaries are updated to the latest version or removed.  Did you
 file a request for removal?

>>>
>>> Adrian Bunk filed bug #880058 "RM: 0ad [armhf] -- NBS; no longer built on
>>> armhf"
>>>
>>> I am not sure it will be enough since the versions for arm64,
>>> kfreebsd-amd64 and kfreebsd-i386 must also be removed.
>>> Should I create 3 new bugs for the other 3 architectures?
>>
>> You can just retitle the original bug, with a message explaining the
>> situation (assuming it isn't closed before then).
>>
>> Currently we have:
>>  0ad | 0.0.21-2  | stretch | source, amd64, armhf, i386
>>  0ad | 0.0.21-2  | sid | source, armhf, kfreebsd-amd64, kfreebsd-i386
>>  0ad | 0.0.22-3  | sid | source, amd64, i386
>>
>> So I think only armhf and kfreebsd-* need removing (not arm64). kfreebsd
>> doesn't affect testing migration in any case.
> 
> So bug #880058, as it is, will remove the armhf version and 0ad should then
> be able to migrate to testing.

Yes.

> I should _not_ file new bugs. Exact?

It probably doesn't matter much, but I think it's easier to retitle
existing bugs if you want to remove the kfreebsd-* binaries as well.

James



signature.asc
Description: OpenPGP digital signature


Bug#878684: marked as done (python3-libxml2: Import fails in Python 3 with error about undefined symbol)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 18:24:30 +
with message-id 
and subject line Bug#878684: fixed in libxml2 2.9.4+dfsg1-5.1
has caused the Debian Bug report #878684,
regarding python3-libxml2: Import fails in Python 3 with error about undefined 
symbol
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
878684: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878684
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: python3-libxml2
Version: 2.9.4+dfsg1-5
Severity: important

python3-libmlx2 doesn't work:

$ python3
Python 3.6.3 (default, Oct  3 2017, 21:16:13) 
[GCC 7.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> import libxml2
Traceback (most recent call last):
  File "", line 1, in 
  File "/usr/lib/python3/dist-packages/libxml2.py", line 1, in 
import libxml2mod
ImportError: 
/usr/lib/python3/dist-packages/libxml2mod.cpython-36m-x86_64-linux-gnu.so: 
undefined symbol: _PyVerify_fd
>>>

Best regards,
Torquil Sørensen

-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (990, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.13.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages python3-libxml2 depends on:
ii  libc6 2.24-17
ii  libpython3.5  3.5.4-4
ii  libpython3.6  3.6.3-1
ii  libxml2   2.9.4+dfsg1-5
ii  python3   3.6.3-1

python3-libxml2 recommends no packages.

python3-libxml2 suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: libxml2
Source-Version: 2.9.4+dfsg1-5.1

We believe that the bug you reported is fixed in the latest version of
libxml2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 878...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso  (supplier of updated libxml2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 18 Nov 2017 16:39:04 +0100
Source: libxml2
Binary: libxml2 libxml2-utils libxml2-dev libxml2-dbg libxml2-doc 
python-libxml2 python-libxml2-dbg python3-libxml2 python3-libxml2-dbg
Architecture: source
Version: 2.9.4+dfsg1-5.1
Distribution: unstable
Urgency: medium
Maintainer: Debian XML/SGML Group 
Changed-By: Salvatore Bonaccorso 
Closes: 855001 878684 88
Description: 
 libxml2- GNOME XML library
 libxml2-dbg - Debugging symbols for the GNOME XML library
 libxml2-dev - Development files for the GNOME XML library
 libxml2-doc - Documentation for the GNOME XML library
 libxml2-utils - XML utilities
 python-libxml2 - Python bindings for the GNOME XML library
 python-libxml2-dbg - Python bindings for the GNOME XML library (debug 
extension)
 python3-libxml2 - Python3 bindings for the GNOME XML library
 python3-libxml2-dbg - Python3 bindings for the GNOME XML library (debug 
extension)
Changes:
 libxml2 (2.9.4+dfsg1-5.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Fix NULL pointer deref in xmlDumpElementContent (CVE-2017-5969)
 (Closes: #855001)
   * Check for integer overflow in memory debug code (CVE-2017-5130)
 (Closes: #88)
   * Fix copy-paste errors in error messages
   * python: remove single use of _PyVerify_fd (Closes: #878684)
Checksums-Sha1: 
 871bb7ee1f4aa0a11266fdd521f00c03d8b2878e 3131 libxml2_2.9.4+dfsg1-5.1.dsc
 e186b1e483df0dfe248dbb7e28c7304fa7d72a15 35444 
libxml2_2.9.4+dfsg1-5.1.debian.tar.xz
Checksums-Sha256: 
 7a43531fcb67956df3973605720b02c09044594c9e7434edb80d336449557826 3131 
libxml2_2.9.4+dfsg1-5.1.dsc
 0a900d807f5de69cb27ddca74db8d6bb83d37abcdfee1c9b2f8a8ddb7ea028f4 35444 
libxml2_2.9.4+dfsg1-5.1.debian.tar.xz
Files: 
 05e2a7b85132c0e38ecb5de2810559a5 3131 libs optional libxml2_2.9.4+dfsg1-5.1.dsc
 64e57ddc61b367103a34e2be4046dd37 35444 libs optional 
libxml2_2.9.4+dfsg1-5.1.debian.tar.xz

-BEGIN PGP SIGNATURE-

iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAloQVdVfFIAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ

Bug#882085: [cowsay] Package includes ASCII representation of Zoophilia

2017-11-18 Thread Felicia Hummel
Package: cowsay
Version: 3.03+dfsg2-3
Severity: critical

--- Please enter the report below this line. ---
The package cowsay includes an ASCII representation of Zoophilia. The
file in question is /usr/share/cowsay/cows/sodomized-sheep.cow

This is a legal issue in many countries. Even if it's not well-defined
by law if ASCII representations of Zoophilia are legal or not, I'd
rather prefer not to take a chance being involved in a lawsuit when such
a file could be found on my computer.

Please remove the file from the packages as soon as possible. Thank you.

All the best
Felicia
--- System information. ---
Architecture: Kernel:   Linux 4.9.0-3-amd64

Debian Release: buster/sid
  500 testing www.deb-multimedia.org   500 testing
ftp2.de.debian.org   500 testing devel.alephobjects.com   500
stable  repository.spotify.com   500 stable
repos.fds-team.de   500 stable  repo.skype.com   500 stable
repo.adminlounge.org   500 stable  dl.google.com   500
stable  deb.dovetail-automata.com   500 oldstable
ftp2.de.debian.org   100 jessie-backports ftp.de.debian.org
--- Package information. ---
Depends (Version) | Installed
=-+-===
libtext-charwidth-perl| 0.04-7.1
perl:any  |

Recommends  (Version) | Installed
=-+-===
cowsay-off| 3.03+dfsg2-3


Suggests  (Version) | Installed
===-+-===
filters |



Bug#881756: swi-prolog: FTBFS on mips: Build killed with signal TERM

2017-11-18 Thread Lev Lamberov
Hi James,

Пт 17 ноя 2017 @ 17:15 James Cowgill :
> IMO the best solution is to remove all the ATOMIC_GENERATION_HACK code
> and use libatomic, but this will take some porting work because
> swi-prolog uses the old __sync primitives everywhere.
>
> I have attached a hack which marks _generation and _last_generation as
> volatile. This seems to work but isn't a long term solution.

Thanks for your input! I've informed upstream about the issue you found
and your suggestions.

Regards,
Lev



Processed: Re: Bug#882080: debian-goodies: checkrestart from debian-goodies 0.77 finds no files to restart

2017-11-18 Thread Debian Bug Tracking System
Processing control commands:

> severity -1 serious
Bug #882080 [debian-goodies] debian-goodies: checkrestart from debian-goodies 
0.77 finds no files to restart
Severity set to 'serious' from 'important'

-- 
882080: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882080
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: tagging 882080

2017-11-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 882080 + confirmed
Bug #882080 [debian-goodies] debian-goodies: checkrestart from debian-goodies 
0.77 finds no files to restart
Added tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
882080: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882080
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#851506: cpanminus embeds other modules in fatpacked library

2017-11-18 Thread Debian Bug Tracking System
Processing control commands:

> found -1 1.7040-1
Bug #851506 [cpanminus] cpanminus embeds other modules in fatpacked library
Marked as found in versions cpanminus/1.7040-1.
> severity -1 serious
Bug #851506 [cpanminus] cpanminus embeds other modules in fatpacked library
Severity set to 'serious' from 'normal'

-- 
851506: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851506
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#882080: debian-goodies: checkrestart from debian-goodies 0.77 finds no files to restart

2017-11-18 Thread Axel Beckert
Hi,

according to git bisect, commit
8c3cad64d8b11f3acba4a856dcc915400d97380d is the culprit:

→ git bisect run sh -c "ssh root@localhost 
'~abe/debian-goodies/debian-goodies/checkrestart 2>&1' | egrep 'Found 
[^0][0-9]* processes using old versions of upgraded files'"
running sh -c ssh root@localhost 
'~abe/debian-goodies/debian-goodies/checkrestart 2>&1' | egrep 'Found 
[^0][0-9]* processes using old versions of upgraded files'
Bisecting: 5 revisions left to test after this (roughly 3 steps)
[aa0411a3db01a1d220b19e12dec128691b9377c9] Document --terse option and adjust 
example for --machine output to the real output shown
running sh -c ssh root@localhost 
'~abe/debian-goodies/debian-goodies/checkrestart 2>&1' | egrep 'Found 
[^0][0-9]* processes using old versions of upgraded files'
Bisecting: 2 revisions left to test after this (roughly 2 steps)
[8c3cad64d8b11f3acba4a856dcc915400d97380d] Provide machine readable output 
based on patch provided by Simon Ruderich
running sh -c ssh root@localhost 
'~abe/debian-goodies/debian-goodies/checkrestart 2>&1' | egrep 'Found 
[^0][0-9]* processes using old versions of upgraded files'
Bisecting: 0 revisions left to test after this (roughly 1 step)
[bad5f00c933eae6a1c4d0048fa08e139e7de7ad8] debian/copyright: Switch one 
previously overseen URL to HTTPS
running sh -c ssh root@localhost 
'~abe/debian-goodies/debian-goodies/checkrestart 2>&1' | egrep 'Found 
[^0][0-9]* processes using old versions of upgraded files'
Found 201 processes using old versions of upgraded files
8c3cad64d8b11f3acba4a856dcc915400d97380d is the first bad commit
commit 8c3cad64d8b11f3acba4a856dcc915400d97380d
Author: Javier Fernandez-Sanguino 
Date:   Mon Nov 6 22:43:26 2017 +0100

Provide machine readable output based on patch provided by Simon Ruderich

:100755 100755 52dbc70e0a143c6fdaeb0b567c0ae6cad3f947c0 
ee28021dc740b409b059f7fa1f9baa5f669f9be0 M  checkrestart
bisect run success

Regards, Axel
-- 
 ,''`.  |  Axel Beckert , https://people.debian.org/~abe/
: :' :  |  Debian Developer, ftp.ch.debian.org Admin
`. `'   |  4096R: 2517 B724 C5F6 CA99 5329  6E61 2FF9 CD59 6126 16B5
  `-|  1024D: F067 EA27 26B9 C3FC 1486  202E C09E 1D89 9593 0EDE



Processed: Version fix

2017-11-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> notfound 838638 0.9.30+debian1-1.1
Bug #838638 [python3-googlecloudapis] /usr/bin/python3-google-api-tools broken; 
missing several dependencies, does not work even after doing so
No longer marked as found in versions python-googlecloudapis/0.9.30+debian1-1.1.
> found 838638 0.9.30+debian1-1
Bug #838638 [python3-googlecloudapis] /usr/bin/python3-google-api-tools broken; 
missing several dependencies, does not work even after doing so
Marked as found in versions python-googlecloudapis/0.9.30+debian1-1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
838638: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838638
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#873099: marked as done (imagemagick: CVE-2017-13134)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 21:03:47 +
with message-id 
and subject line Bug#873099: fixed in imagemagick 8:6.9.7.4+dfsg-11+deb9u3
has caused the Debian Bug report #873099,
regarding imagemagick: CVE-2017-13134
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
873099: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873099
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: important
Tags: security patch upstream
Forwarded: https://github.com/ImageMagick/ImageMagick/issues/670

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-13134[0]:
| In ImageMagick 7.0.6-6, a heap-based buffer over-read was found in the
| function SFWScan in coders/sfw.c, which allows attackers to cause a
| denial of service via a crafted file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-13134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.9.7.4+dfsg-11+deb9u3

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 873...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Mühlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 10 Nov 2017 20:46:29 +0100
Source: imagemagick
Binary: imagemagick-6-common imagemagick-6-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-3 
libmagickcore-6.q16-3-extra libmagickcore-6.q16-dev libmagickwand-6.q16-3 
libmagickwand-6.q16-dev libmagick++-6.q16-7 libmagick++-6.q16-dev 
libimage-magick-q16-perl imagemagick-6.q16hdri libmagickcore-6.q16hdri-3 
libmagickcore-6.q16hdri-3-extra libmagickcore-6.q16hdri-dev 
libmagickwand-6.q16hdri-3 libmagickwand-6.q16hdri-dev libmagick++-6.q16hdri-7 
libmagick++-6.q16hdri-dev libimage-magick-q16hdri-perl imagemagick-common 
imagemagick-doc perlmagick libmagickcore-dev libmagickwand-dev libmagick++-dev 
imagemagick
Architecture: source all amd64
Version: 8:6.9.7.4+dfsg-11+deb9u3
Distribution: stretch-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Mühlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6-common - image manipulation programs -- infrastructure
 imagemagick-6-doc - document files of ImageMagick
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-6.q16hdri - image manipulation programs -- quantum depth Q16HDRI
 imagemagick-common - image manipulation programs -- infrastructure dummy 
package
 imagemagick-doc - document files of ImageMagick -- dummy package
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libimage-magick-q16hdri-perl - Perl interface to the ImageMagick graphics 
routines -- Q16HDRI ve
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-7 - C++ interface to ImageMagick -- quantum depth Q16
 libmagick++-6.q16-dev - C++ interface to ImageMagick - development files (Q16)
 libmagick++-6.q16hdri-7 - C++ interface to ImageMagick -- quantum depth Q16HDRI
 libmagick++-6.q16hdri-dev - C++ interface to ImageMagick - development files 
(Q16HDRI)
 libmagick++-dev - object-oriented C++ interface to ImageMagick -- dummy package
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library - header files
 libmagickcore-6.q16-3 - low-level image manipulation library -- quantum depth 
Q16
 libmagickcor

Bug#873134: marked as done (imagemagick: CVE-2017-12983)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 21:03:47 +
with message-id 
and subject line Bug#873134: fixed in imagemagick 8:6.9.7.4+dfsg-11+deb9u3
has caused the Debian Bug report #873134,
regarding imagemagick: CVE-2017-12983
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
873134: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873134
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: important
Tags: security patch upstream
Forwarded: https://github.com/ImageMagick/ImageMagick/issues/682

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-12983[0]:
| Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c
| in ImageMagick 7.0.6-8 allows remote attackers to cause a denial of
| service (application crash) or possibly have unspecified other impact
| via a crafted file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-12983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983
[1] https://github.com/ImageMagick/ImageMagick/issues/682

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.9.7.4+dfsg-11+deb9u3

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 873...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Mühlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 10 Nov 2017 20:46:29 +0100
Source: imagemagick
Binary: imagemagick-6-common imagemagick-6-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-3 
libmagickcore-6.q16-3-extra libmagickcore-6.q16-dev libmagickwand-6.q16-3 
libmagickwand-6.q16-dev libmagick++-6.q16-7 libmagick++-6.q16-dev 
libimage-magick-q16-perl imagemagick-6.q16hdri libmagickcore-6.q16hdri-3 
libmagickcore-6.q16hdri-3-extra libmagickcore-6.q16hdri-dev 
libmagickwand-6.q16hdri-3 libmagickwand-6.q16hdri-dev libmagick++-6.q16hdri-7 
libmagick++-6.q16hdri-dev libimage-magick-q16hdri-perl imagemagick-common 
imagemagick-doc perlmagick libmagickcore-dev libmagickwand-dev libmagick++-dev 
imagemagick
Architecture: source all amd64
Version: 8:6.9.7.4+dfsg-11+deb9u3
Distribution: stretch-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Mühlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6-common - image manipulation programs -- infrastructure
 imagemagick-6-doc - document files of ImageMagick
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-6.q16hdri - image manipulation programs -- quantum depth Q16HDRI
 imagemagick-common - image manipulation programs -- infrastructure dummy 
package
 imagemagick-doc - document files of ImageMagick -- dummy package
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libimage-magick-q16hdri-perl - Perl interface to the ImageMagick graphics 
routines -- Q16HDRI ve
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-7 - C++ interface to ImageMagick -- quantum depth Q16
 libmagick++-6.q16-dev - C++ interface to ImageMagick - development files (Q16)
 libmagick++-6.q16hdri-7 - C++ interface to ImageMagick -- quantum depth Q16HDRI
 libmagick++-6.q16hdri-dev - C++ interface to ImageMagick - development files 
(Q16HDRI)
 libmagick++-dev - object-oriented C++ interface to ImageMagick -- dummy package
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library

Bug#878578: marked as done (imagemagick: CVE-2017-15277)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 21:03:47 +
with message-id 
and subject line Bug#878578: fixed in imagemagick 8:6.9.7.4+dfsg-11+deb9u3
has caused the Debian Bug report #878578,
regarding imagemagick: CVE-2017-15277
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
878578: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878578
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: important
Tags: patch security upstream
Forwarded: https://github.com/ImageMagick/ImageMagick/issues/592

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-15277[0]:
| ReadGIFImage in coders/gif.c in ImageMagick 7.0.6-1 and GraphicsMagick
| 1.3.26 leaves the palette uninitialized when processing a GIF file that
| has neither a global nor local palette. If the affected product is used
| as a library loaded into a process that operates on interesting data,
| this data sometimes can be leaked via the uninitialized palette.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-15277
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
[1] https://github.com/ImageMagick/ImageMagick/issues/592

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.9.7.4+dfsg-11+deb9u3

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 878...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Mühlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 10 Nov 2017 20:46:29 +0100
Source: imagemagick
Binary: imagemagick-6-common imagemagick-6-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-3 
libmagickcore-6.q16-3-extra libmagickcore-6.q16-dev libmagickwand-6.q16-3 
libmagickwand-6.q16-dev libmagick++-6.q16-7 libmagick++-6.q16-dev 
libimage-magick-q16-perl imagemagick-6.q16hdri libmagickcore-6.q16hdri-3 
libmagickcore-6.q16hdri-3-extra libmagickcore-6.q16hdri-dev 
libmagickwand-6.q16hdri-3 libmagickwand-6.q16hdri-dev libmagick++-6.q16hdri-7 
libmagick++-6.q16hdri-dev libimage-magick-q16hdri-perl imagemagick-common 
imagemagick-doc perlmagick libmagickcore-dev libmagickwand-dev libmagick++-dev 
imagemagick
Architecture: source all amd64
Version: 8:6.9.7.4+dfsg-11+deb9u3
Distribution: stretch-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Mühlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6-common - image manipulation programs -- infrastructure
 imagemagick-6-doc - document files of ImageMagick
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-6.q16hdri - image manipulation programs -- quantum depth Q16HDRI
 imagemagick-common - image manipulation programs -- infrastructure dummy 
package
 imagemagick-doc - document files of ImageMagick -- dummy package
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libimage-magick-q16hdri-perl - Perl interface to the ImageMagick graphics 
routines -- Q16HDRI ve
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-7 - C++ interface to ImageMagick -- quantum depth Q16
 libmagick++-6.q16-dev - C++ interface to ImageMagick - development files (Q16)
 libmagick++-6.q16hdri-7 - C++ interface to ImageMagick -- quantum depth Q16HDRI
 libmagick++-6.q16hdri-dev - C++ interface to ImageMagick - development files 
(Q16HDRI)
 libmagick++-dev - object-oriented C++ interface to ImageMagick -- dummy package
 libmagickcore-6-arch-config - low-lev

Bug#876097: marked as done (imagemagick: CVE-2017-14224: Heap buffer overflow in WritePCXImage)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 21:03:47 +
with message-id 
and subject line Bug#876097: fixed in imagemagick 8:6.9.7.4+dfsg-11+deb9u3
has caused the Debian Bug report #876097,
regarding imagemagick: CVE-2017-14224: Heap buffer overflow in WritePCXImage
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
876097: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876097
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: important
Tags: upstream security patch
Forwarded: https://github.com/ImageMagick/ImageMagick/issues/733

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-14224[0]:
| A heap-based buffer overflow in WritePCXImage in coders/pcx.c in
| ImageMagick 7.0.6-8 Q16 allows remote attackers to cause a denial of
| service or code execution via a crafted file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-14224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224
[1] https://github.com/ImageMagick/ImageMagick/issues/733

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.9.7.4+dfsg-11+deb9u3

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 876...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Mühlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 10 Nov 2017 20:46:29 +0100
Source: imagemagick
Binary: imagemagick-6-common imagemagick-6-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-3 
libmagickcore-6.q16-3-extra libmagickcore-6.q16-dev libmagickwand-6.q16-3 
libmagickwand-6.q16-dev libmagick++-6.q16-7 libmagick++-6.q16-dev 
libimage-magick-q16-perl imagemagick-6.q16hdri libmagickcore-6.q16hdri-3 
libmagickcore-6.q16hdri-3-extra libmagickcore-6.q16hdri-dev 
libmagickwand-6.q16hdri-3 libmagickwand-6.q16hdri-dev libmagick++-6.q16hdri-7 
libmagick++-6.q16hdri-dev libimage-magick-q16hdri-perl imagemagick-common 
imagemagick-doc perlmagick libmagickcore-dev libmagickwand-dev libmagick++-dev 
imagemagick
Architecture: source all amd64
Version: 8:6.9.7.4+dfsg-11+deb9u3
Distribution: stretch-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Mühlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6-common - image manipulation programs -- infrastructure
 imagemagick-6-doc - document files of ImageMagick
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-6.q16hdri - image manipulation programs -- quantum depth Q16HDRI
 imagemagick-common - image manipulation programs -- infrastructure dummy 
package
 imagemagick-doc - document files of ImageMagick -- dummy package
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libimage-magick-q16hdri-perl - Perl interface to the ImageMagick graphics 
routines -- Q16HDRI ve
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-7 - C++ interface to ImageMagick -- quantum depth Q16
 libmagick++-6.q16-dev - C++ interface to ImageMagick - development files (Q16)
 libmagick++-6.q16hdri-7 - C++ interface to ImageMagick -- quantum depth Q16HDRI
 libmagick++-6.q16hdri-dev - C++ interface to ImageMagick - development files 
(Q16HDRI)
 libmagick++-dev - object-oriented C++ interface to ImageMagick -- dummy package
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library - header fil

Bug#875800: marked as done (double free or corruption (!prev))

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 21:03:42 +
with message-id 
and subject line Bug#875800: fixed in flickcurl 1.26-2+deb9u1
has caused the Debian Bug report #875800,
regarding double free or corruption (!prev)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
875800: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875800
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: flickcurl-utils
Version: 1.26-2
Severity: grave
File: /usr/bin/flickcurl

$ flickcurl oauth.create
*** Error in `flickcurl': double free or corruption (!prev): 0x0176b510 ***
=== Backtrace: =
/lib/i386-linux-gnu/libc.so.6(+0x698aa)[0xb72e18aa]
/lib/i386-linux-gnu/libc.so.6(+0x705f7)[0xb72e85f7]
/lib/i386-linux-gnu/libc.so.6(+0x70e46)[0xb72e8e46]
/usr/lib/i386-linux-gnu/libflickcurl.so.0(flickcurl_free_form+0x22)[0xb7748a62]
/usr/lib/i386-linux-gnu/libflickcurl.so.0(flickcurl_oauth_create_request_token+0x201)[0xb7766f61]
flickcurl(+0xce50)[0x469e50]
flickcurl(main+0x62c)[0x46425c]
/lib/i386-linux-gnu/libc.so.6(__libc_start_main+0xf6)[0xb7290456]
flickcurl(+0x7310)[0x464310]
=== Memory map: 
0045d000-0047c000 r-xp  08:08 65457  /usr/bin/flickcurl
0047c000-0047d000 r--p 0001e000 08:08 65457  /usr/bin/flickcurl
0047d000-0047f000 rw-p 0001f000 08:08 65457  /usr/bin/flickcurl
00a1b000-017a5000 rw-p  00:00 0  [heap]
b400-b4021000 rw-p  00:00 0 
b4021000-b410 ---p  00:00 0 
b41d4000-b41d9000 r-xp  08:08 228674 
/lib/i386-linux-gnu/libnss_dns-2.25.so
b41d9000-b41da000 r--p 4000 08:08 228674 
/lib/i386-linux-gnu/libnss_dns-2.25.so
b41da000-b41db000 rw-p 5000 08:08 228674 
/lib/i386-linux-gnu/libnss_dns-2.25.so
b41db000-b41e6000 r-xp  08:08 228676 
/lib/i386-linux-gnu/libnss_files-2.25.so...

-- System Information:
Debian Release: buster/sid
  APT prefers experimental
  APT policy: (990, 'experimental'), (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 4.12.0-1-686-pae (SMP w/1 CPU core)
Locale: LANG=zh_TW.UTF-8, LC_CTYPE=zh_TW.UTF-8 (charmap=UTF-8), 
LANGUAGE=zh_TW.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Init: systemd (via /run/systemd/system)

Versions of packages flickcurl-utils depends on:
ii  libc62.25-0experimental3
ii  libcurl3-gnutls  7.55.1-1
ii  libflickcurl01.26-2
ii  libraptor2-0 2.0.14-1+b1
ii  libxml2  2.9.4+dfsg1-4

flickcurl-utils recommends no packages.

flickcurl-utils suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: flickcurl
Source-Version: 1.26-2+deb9u1

We believe that the bug you reported is fixed in the latest version of
flickcurl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 875...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Kumar Appaiah  (supplier of updated flickcurl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 30 Mar 2017 07:25:12 +0530
Source: flickcurl
Binary: libflickcurl-dev libflickcurl0 libflickcurl0-dbg flickcurl-utils 
flickcurl-doc
Architecture: source all amd64
Version: 1.26-2+deb9u1
Distribution: stable
Urgency: medium
Maintainer: Kumar Appaiah 
Changed-By: Kumar Appaiah 
Description:
 flickcurl-doc - utilities to call the Flickr API from command line - 
documentatio
 flickcurl-utils - utilities to call the Flickr API from command line
 libflickcurl-dev - C library for accessing the Flickr API - development files
 libflickcurl0 - C library for accessing the Flickr API
 libflickcurl0-dbg - C library for accessing the Flickr API - debugging symbols
Closes: 859019 875800
Changes:
 flickcurl (1.26-2+deb9u1) stable; urgency=medium
 .
   * Apply patch from upstream to fix oauth token fetching
   * Apply patch from upstream to prevent double free corruption
 during authentication (Closes: #875800)
   * Remove broken devhelp link in flickcurl-doc (Closes: #859019)
Checksums-Sha1:
 c652fcb0fab9189c31b4755ce544513dc4cb8ea7 2217 flickcurl_1.26-2+deb9u1.dsc
 fcc0ead917f2d74c1669697bb77ebc0c1f5eb960 6768 
flickcurl_1.26-2+deb9u1.debian.tar.xz
 fe69c19c852

Bug#878508: marked as done (imagemagick: CVE-2017-13758)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 21:03:47 +
with message-id 
and subject line Bug#878508: fixed in imagemagick 8:6.9.7.4+dfsg-11+deb9u3
has caused the Debian Bug report #878508,
regarding imagemagick: CVE-2017-13758
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
878508: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878508
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: important
Tags: patch security upstream
Forwarded: 
https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=32583

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-13758[0]:
| In ImageMagick 7.0.6-10, there is a heap-based buffer overflow in the
| TracePoint() function in MagickCore/draw.c.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-13758
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758
[1] https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=32583

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.9.7.4+dfsg-11+deb9u3

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 878...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Mühlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 10 Nov 2017 20:46:29 +0100
Source: imagemagick
Binary: imagemagick-6-common imagemagick-6-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-3 
libmagickcore-6.q16-3-extra libmagickcore-6.q16-dev libmagickwand-6.q16-3 
libmagickwand-6.q16-dev libmagick++-6.q16-7 libmagick++-6.q16-dev 
libimage-magick-q16-perl imagemagick-6.q16hdri libmagickcore-6.q16hdri-3 
libmagickcore-6.q16hdri-3-extra libmagickcore-6.q16hdri-dev 
libmagickwand-6.q16hdri-3 libmagickwand-6.q16hdri-dev libmagick++-6.q16hdri-7 
libmagick++-6.q16hdri-dev libimage-magick-q16hdri-perl imagemagick-common 
imagemagick-doc perlmagick libmagickcore-dev libmagickwand-dev libmagick++-dev 
imagemagick
Architecture: source all amd64
Version: 8:6.9.7.4+dfsg-11+deb9u3
Distribution: stretch-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Mühlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6-common - image manipulation programs -- infrastructure
 imagemagick-6-doc - document files of ImageMagick
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-6.q16hdri - image manipulation programs -- quantum depth Q16HDRI
 imagemagick-common - image manipulation programs -- infrastructure dummy 
package
 imagemagick-doc - document files of ImageMagick -- dummy package
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libimage-magick-q16hdri-perl - Perl interface to the ImageMagick graphics 
routines -- Q16HDRI ve
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-7 - C++ interface to ImageMagick -- quantum depth Q16
 libmagick++-6.q16-dev - C++ interface to ImageMagick - development files (Q16)
 libmagick++-6.q16hdri-7 - C++ interface to ImageMagick -- quantum depth Q16HDRI
 libmagick++-6.q16hdri-dev - C++ interface to ImageMagick - development files 
(Q16HDRI)
 libmagick++-dev - object-oriented C++ interface to ImageMagick -- dummy package
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library - header files
 libmagickcore-6.q16-3 - low-level image manipulation library -- quan

Bug#878527: marked as done (imagemagick: CVE-2017-14607)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 21:03:47 +
with message-id 
and subject line Bug#878527: fixed in imagemagick 8:6.9.7.4+dfsg-11+deb9u3
has caused the Debian Bug report #878527,
regarding imagemagick: CVE-2017-14607
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
878527: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878527
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: important
Tags: patch security upstream
Forwarded: https://github.com/ImageMagick/ImageMagick/issues/765

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-14607[0]:
| In ImageMagick 7.0.7-4 Q16, an out of bounds read flaw related to
| ReadTIFFImage has been reported in coders/tiff.c. An attacker could
| possibly exploit this flaw to disclose potentially sensitive memory or
| cause an application crash.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-14607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607
[1] https://github.com/ImageMagick/ImageMagick/issues/765

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.9.7.4+dfsg-11+deb9u3

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 878...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Mühlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 10 Nov 2017 20:46:29 +0100
Source: imagemagick
Binary: imagemagick-6-common imagemagick-6-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-3 
libmagickcore-6.q16-3-extra libmagickcore-6.q16-dev libmagickwand-6.q16-3 
libmagickwand-6.q16-dev libmagick++-6.q16-7 libmagick++-6.q16-dev 
libimage-magick-q16-perl imagemagick-6.q16hdri libmagickcore-6.q16hdri-3 
libmagickcore-6.q16hdri-3-extra libmagickcore-6.q16hdri-dev 
libmagickwand-6.q16hdri-3 libmagickwand-6.q16hdri-dev libmagick++-6.q16hdri-7 
libmagick++-6.q16hdri-dev libimage-magick-q16hdri-perl imagemagick-common 
imagemagick-doc perlmagick libmagickcore-dev libmagickwand-dev libmagick++-dev 
imagemagick
Architecture: source all amd64
Version: 8:6.9.7.4+dfsg-11+deb9u3
Distribution: stretch-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Mühlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6-common - image manipulation programs -- infrastructure
 imagemagick-6-doc - document files of ImageMagick
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-6.q16hdri - image manipulation programs -- quantum depth Q16HDRI
 imagemagick-common - image manipulation programs -- infrastructure dummy 
package
 imagemagick-doc - document files of ImageMagick -- dummy package
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libimage-magick-q16hdri-perl - Perl interface to the ImageMagick graphics 
routines -- Q16HDRI ve
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-7 - C++ interface to ImageMagick -- quantum depth Q16
 libmagick++-6.q16-dev - C++ interface to ImageMagick - development files (Q16)
 libmagick++-6.q16hdri-7 - C++ interface to ImageMagick -- quantum depth Q16HDRI
 libmagick++-6.q16hdri-dev - C++ interface to ImageMagick - development files 
(Q16HDRI)
 libmagick++-dev - object-oriented C++ interface to ImageMagick -- dummy package
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation libr

Bug#876488: marked as done (imagemagick: CVE-2017-14682: Heap buffer overflow in GetNextToken())

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 21:03:47 +
with message-id 
and subject line Bug#876488: fixed in imagemagick 8:6.9.7.4+dfsg-11+deb9u3
has caused the Debian Bug report #876488,
regarding imagemagick: CVE-2017-14682: Heap buffer overflow in GetNextToken()
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
876488: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876488
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: grave
Tags: upstream security patch
Forwarded: 
https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=32726

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-14682[0]:
| GetNextToken in MagickCore/token.c in ImageMagick 7.0.6 allows remote
| attackers to cause a denial of service (heap-based buffer overflow and
| application crash) or possibly have unspecified other impact via a
| crafted SVG document, a different vulnerability than CVE-2017-10928.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-14682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682
[1] https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=32726
[2] 
https://github.com/ImageMagick/ImageMagick/commit/3bee958ee63eb6ec62834d0c7b28b4b6835e6a00

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.9.7.4+dfsg-11+deb9u3

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 876...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Mühlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 10 Nov 2017 20:46:29 +0100
Source: imagemagick
Binary: imagemagick-6-common imagemagick-6-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-3 
libmagickcore-6.q16-3-extra libmagickcore-6.q16-dev libmagickwand-6.q16-3 
libmagickwand-6.q16-dev libmagick++-6.q16-7 libmagick++-6.q16-dev 
libimage-magick-q16-perl imagemagick-6.q16hdri libmagickcore-6.q16hdri-3 
libmagickcore-6.q16hdri-3-extra libmagickcore-6.q16hdri-dev 
libmagickwand-6.q16hdri-3 libmagickwand-6.q16hdri-dev libmagick++-6.q16hdri-7 
libmagick++-6.q16hdri-dev libimage-magick-q16hdri-perl imagemagick-common 
imagemagick-doc perlmagick libmagickcore-dev libmagickwand-dev libmagick++-dev 
imagemagick
Architecture: source all amd64
Version: 8:6.9.7.4+dfsg-11+deb9u3
Distribution: stretch-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Mühlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6-common - image manipulation programs -- infrastructure
 imagemagick-6-doc - document files of ImageMagick
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-6.q16hdri - image manipulation programs -- quantum depth Q16HDRI
 imagemagick-common - image manipulation programs -- infrastructure dummy 
package
 imagemagick-doc - document files of ImageMagick -- dummy package
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libimage-magick-q16hdri-perl - Perl interface to the ImageMagick graphics 
routines -- Q16HDRI ve
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-7 - C++ interface to ImageMagick -- quantum depth Q16
 libmagick++-6.q16-dev - C++ interface to ImageMagick - development files (Q16)
 libmagick++-6.q16hdri-7 - C++ interface to ImageMagick -- quantum depth Q16HDRI
 libmagick++-6.q16hdri-dev - C++ interface to ImageMagick - development files 
(Q16HDRI)
 libmagick++-dev - object-o

Bug#878562: marked as done (imagemagick: CVE-2017-14989)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 21:03:47 +
with message-id 
and subject line Bug#878562: fixed in imagemagick 8:6.9.7.4+dfsg-11+deb9u3
has caused the Debian Bug report #878562,
regarding imagemagick: CVE-2017-14989
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
878562: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878562
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.8.9.9-1
Severity: important
Tags: patch security upstream
Forwarded: https://github.com/ImageMagick/ImageMagick/issues/781

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-14989[0]:
| A use-after-free in RenderFreetype in MagickCore/annotate.c in
| ImageMagick 7.0.7-4 Q16 allows attackers to crash the application via a
| crafted font file, because the FT_Done_Glyph function (from FreeType 2)
| is called at an incorrect place in the ImageMagick code.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-14989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989
[1] https://github.com/ImageMagick/ImageMagick/issues/781

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.9.7.4+dfsg-11+deb9u3

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 878...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Mühlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 10 Nov 2017 20:46:29 +0100
Source: imagemagick
Binary: imagemagick-6-common imagemagick-6-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-3 
libmagickcore-6.q16-3-extra libmagickcore-6.q16-dev libmagickwand-6.q16-3 
libmagickwand-6.q16-dev libmagick++-6.q16-7 libmagick++-6.q16-dev 
libimage-magick-q16-perl imagemagick-6.q16hdri libmagickcore-6.q16hdri-3 
libmagickcore-6.q16hdri-3-extra libmagickcore-6.q16hdri-dev 
libmagickwand-6.q16hdri-3 libmagickwand-6.q16hdri-dev libmagick++-6.q16hdri-7 
libmagick++-6.q16hdri-dev libimage-magick-q16hdri-perl imagemagick-common 
imagemagick-doc perlmagick libmagickcore-dev libmagickwand-dev libmagick++-dev 
imagemagick
Architecture: source all amd64
Version: 8:6.9.7.4+dfsg-11+deb9u3
Distribution: stretch-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Mühlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6-common - image manipulation programs -- infrastructure
 imagemagick-6-doc - document files of ImageMagick
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-6.q16hdri - image manipulation programs -- quantum depth Q16HDRI
 imagemagick-common - image manipulation programs -- infrastructure dummy 
package
 imagemagick-doc - document files of ImageMagick -- dummy package
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libimage-magick-q16hdri-perl - Perl interface to the ImageMagick graphics 
routines -- Q16HDRI ve
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-7 - C++ interface to ImageMagick -- quantum depth Q16
 libmagick++-6.q16-dev - C++ interface to ImageMagick - development files (Q16)
 libmagick++-6.q16hdri-7 - C++ interface to ImageMagick -- quantum depth Q16HDRI
 libmagick++-6.q16hdri-dev - C++ interface to ImageMagick - development files 
(Q16HDRI)
 libmagick++-dev - object-oriented C++ interface to ImageMagick -- dummy package
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library - header files
 libmagickcore-

Bug#878507: marked as done (imagemagick: CVE-2017-13769)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 21:03:47 +
with message-id 
and subject line Bug#878507: fixed in imagemagick 8:6.9.7.4+dfsg-11+deb9u3
has caused the Debian Bug report #878507,
regarding imagemagick: CVE-2017-13769
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
878507: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878507
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: important
Tags: patch security upstream
Forwarded: https://github.com/ImageMagick/ImageMagick/issues/705

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-13769[0]:
| The WriteTHUMBNAILImage function in coders/thumbnail.c in ImageMagick
| through 7.0.6-10 allows an attacker to cause a denial of service
| (buffer over-read) by sending a crafted JPEG file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-13769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769
[1] https://github.com/ImageMagick/ImageMagick/issues/705

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.9.7.4+dfsg-11+deb9u3

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 878...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Mühlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 10 Nov 2017 20:46:29 +0100
Source: imagemagick
Binary: imagemagick-6-common imagemagick-6-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-3 
libmagickcore-6.q16-3-extra libmagickcore-6.q16-dev libmagickwand-6.q16-3 
libmagickwand-6.q16-dev libmagick++-6.q16-7 libmagick++-6.q16-dev 
libimage-magick-q16-perl imagemagick-6.q16hdri libmagickcore-6.q16hdri-3 
libmagickcore-6.q16hdri-3-extra libmagickcore-6.q16hdri-dev 
libmagickwand-6.q16hdri-3 libmagickwand-6.q16hdri-dev libmagick++-6.q16hdri-7 
libmagick++-6.q16hdri-dev libimage-magick-q16hdri-perl imagemagick-common 
imagemagick-doc perlmagick libmagickcore-dev libmagickwand-dev libmagick++-dev 
imagemagick
Architecture: source all amd64
Version: 8:6.9.7.4+dfsg-11+deb9u3
Distribution: stretch-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Mühlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6-common - image manipulation programs -- infrastructure
 imagemagick-6-doc - document files of ImageMagick
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-6.q16hdri - image manipulation programs -- quantum depth Q16HDRI
 imagemagick-common - image manipulation programs -- infrastructure dummy 
package
 imagemagick-doc - document files of ImageMagick -- dummy package
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libimage-magick-q16hdri-perl - Perl interface to the ImageMagick graphics 
routines -- Q16HDRI ve
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-7 - C++ interface to ImageMagick -- quantum depth Q16
 libmagick++-6.q16-dev - C++ interface to ImageMagick - development files (Q16)
 libmagick++-6.q16hdri-7 - C++ interface to ImageMagick -- quantum depth Q16HDRI
 libmagick++-6.q16hdri-dev - C++ interface to ImageMagick - development files 
(Q16HDRI)
 libmagick++-dev - object-oriented C++ interface to ImageMagick -- dummy package
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library - header files
 libmagickcore-6.q16-3 - low-l

Bug#882088: libicu-le-hb-dev: fails to upgrade from 'sid' - trying to overwrite /usr/lib/x86_64-linux-gnu/pkgconfig/icu-le.pc

2017-11-18 Thread Andreas Beckmann
Package: libicu-le-hb-dev
Version: 1.0.3+git161113-2
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package fails to upgrade from
'sid' to 'experimental'.
It installed fine in 'sid', then the upgrade to 'experimental' fails
because it tries to overwrite other packages files without declaring a
Breaks+Replaces relation.

See policy 7.6 at
https://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces

>From the attached log (scroll to the bottom...):

  Unpacking libicu-le-hb-dev:amd64 (1.0.3+git161113-2) ...
  dpkg: error processing archive 
/tmp/apt-dpkg-install-ayU5Lf/29-libicu-le-hb-dev_1.0.3+git161113-2_amd64.deb 
(--unpack):
   trying to overwrite '/usr/lib/x86_64-linux-gnu/pkgconfig/icu-le.pc', which 
is also in package libicu-dev 57.1-8
  Errors were encountered while processing:
   /tmp/apt-dpkg-install-ayU5Lf/29-libicu-le-hb-dev_1.0.3+git161113-2_amd64.deb


cheers,

Andreas


libicu-dev=57.1-8_libicu-le-hb-dev=1.0.3+git161113-2.log.gz
Description: application/gzip


Bug#882089: libdebian-installer FTBFS since glibc 2.25

2017-11-18 Thread Helmut Grohne
Source: libdebian-installer
Version: 0.111
Severity: serious
Justification: fails to build from source (but built successfully in the past)
User: helm...@debian.org
Usertags: rebootstrap

| make[5]: Entering directory '/<>/build/src/system'
| /bin/bash ../../libtool  --tag=CC   --mode=compile gcc -DHAVE_CONFIG_H -I. 
-I../../../src/system  -I../../../include -I../../ -Wdate-time 
-D_FORTIFY_SOURCE=2  -Wall -W -Werror -ggdb -Wmissing-declarations -Os 
-fomit-frame-pointer -c -o devfs.lo ../../../src/system/devfs.c
| libtool: compile:  gcc -DHAVE_CONFIG_H -I. -I../../../src/system 
-I../../../include -I../../ -Wdate-time -D_FORTIFY_SOURCE=2 -Wall -W -Werror 
-ggdb -Wmissing-declarations -Os -fomit-frame-pointer -c 
../../../src/system/devfs.c  -fPIC -DPIC -o .libs/devfs.o
| ../../../src/system/devfs.c: In function 'di_system_devfs_map_from':
| ../../../src/system/devfs.c:127:13: error: In the GNU C Library, "major" is 
defined
|  by . For historical compatibility, it is
|  currently defined by  as well, but we plan to
|  remove this soon. To use "major", include 
|  directly. If you did not intend to use a system-defined macro
|  "major", you should undefine it after including . [-Werror]
|  if (major (s.st_rdev) == e->major &&
|  ^~~~ 



   
| ../../../src/system/devfs.c:128:13: error: In the GNU C Library, "minor" is 
defined
|  by . For historical compatibility, it is
|  currently defined by  as well, but we plan to
|  remove this soon. To use "minor", include 
|  directly. If you did not intend to use a system-defined macro
|  "minor", you should undefine it after including . [-Werror]
|  ((e->type == ENTRY_TYPE_ONE && minor (s.st_rdev) == e->minor) ||
|  ^~~~ 



   
| ../../../src/system/devfs.c:129:13: error: In the GNU C Library, "minor" is 
defined
|  by . For historical compatibility, it is
|  currently defined by  as well, but we plan to
|  remove this soon. To use "minor", include 
|  directly. If you did not intend to use a system-defined macro
|  "minor", you should undefine it after including . [-Werror]
|   (e->type != ENTRY_TYPE_ONE && minor (s.st_rdev) >= e->minor))) {
|  ^



   
| ../../../src/system/devfs.c:151:13: error: In the GNU C Library, "minor" is 
defined
|  by . For historical compatibility, it is
|  currently defined by  as well, but we plan to
|  remove this soon. To use "minor", include 
|  directly. If you did not intend to use a system-defined macro
|  "minor", you should undefine it after including . [-Werror]
|disc = minor (s.st_rdev) - e->minor + e->entry_first;
|  ^~~  



   
| ../../../src/system/devfs.c:159:13: error: In the GNU C Library, "minor" is 
defined
|  by . For historical compatibility, it is
|  currently defined by  as well, but we plan to
|  remove this soon. To use "minor", include 
|  directly. If you did not intend to use a system-defined macro
|  "minor", you should undefine it after including . [-Werror]
|disc = (minor (s.st_rdev) >> e->entry_disc_minor_shift);
|  ^~   



   
| ../../../src/system/devfs.c:160:13: error: In the GNU C Library, "minor" is 
defined
|  by . For historical compatibility, it is
|  currently defined

Bug#878818: marked as done (ovito: FTBFS - Testsuite fails because executed with python3.5 instead of 3.6)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 21:10:37 +
with message-id 
and subject line Bug#878818: fixed in ovito 2.9.0+dfsg1-3
has caused the Debian Bug report #878818,
regarding ovito: FTBFS - Testsuite fails because executed with python3.5 
instead of 3.6
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
878818: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878818
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ovito
Version: 2.9.0+dfsg1-2
Severity: serious
Tags: patch
Justification: FTBFS

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi,

With the ongoing python3.6 transition ovito is built with both python3.5 and 
3.6. The latter being the defaut.
This makes the testsuite fails with:
make[1]: Entering directory 
'/<>/ovito-2.9.0+dfsg1/obj-x86_64-linux-gnu'

Running tests...
/usr/bin/ctest --force-new-ctest-process -j1
Test project /<>/ovito-2.9.0+dfsg1/obj-x86_64-linux-gnu
Start   1: affine_transformation_modifier.py
  1/184 Test   #1: affine_transformation_modifier.py ..   
Passed0.39 sec
Start   2: affine_transformation_modifier.py_extern
  2/184 Test   #2: affine_transformation_modifier.py_extern 
...***Failed0.13 sec
Traceback (most recent call last):
  File "affine_transformation_modifier.py", line 1, in 
from ovito.io import *
  File 
"/<>/ovito-2.9.0+dfsg1/obj-x86_64-linux-gnu/lib/ovito/plugins/python/ovito/__init__.py",
 line 17, in 
import ovito.plugins.PyScript
ImportError: Python version mismatch: module was compiled for version 3.6, 
while the interpreter is running version 3.5.

Start   3: ambient_occlusion_modifier.py
  3/184 Test   #3: ambient_occlusion_modifier.py ..   
Passed0.29 sec
Start   4: ambient_occlusion_modifier.py_extern
  4/184 Test   #4: ambient_occlusion_modifier.py_extern 
...***Failed0.13 sec
Traceback (most recent call last):
  File "ambient_occlusion_modifier.py", line 1, in 
import ovito
  File 
"/<>/ovito-2.9.0+dfsg1/obj-x86_64-linux-gnu/lib/ovito/plugins/python/ovito/__init__.py",
 line 17, in 
import ovito.plugins.PyScript
ImportError: Python version mismatch: module was compiled for version 3.6, 
while the interpreter is running version 3.5.
...

An easy workaround is to tell cmake to use the default python3 interpreter 
instead of the first one it finds.
Patch attached.

Thanks,

_g.


- -- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.12.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

-BEGIN PGP SIGNATURE-

iQEzBAEBCAAdFiEEoJObzArDE05WtIyR7+hsbH/+z4MFAlnlGykACgkQ7+hsbH/+
z4ObBwf7BIOnt3YAnvDpLQk6VSyeGDFodYuyyRqsG3a2GaLngyjYTNi9JsMEZ5OL
Bbxo3+exnQANSZqsI/7Iz+K1kN2EQZxIAwym9GLLIn+k4Sv2H5eoOGRM0YnmfsK/
5skaLKsfXmqEBD6p+v35E1/GylJt7AhkqHpd/QqYjgT9tiYyHOYkm6Xkg4rSrjBh
9BWKYeb2ecUYYxJkMzJ92eIjkJ+9qL4NLgDnj5gEclSb7HHpIQN+f7IEDePNqNyA
ZmshKvKF8mrA4/5vIfjr2lAz8u1FcbWGEZxdKf2Vwvw4KX+QkqkO8DveMZmLvmMU
Jb0tHh1m08wt504mfH7A4J3SAdYq9A==
=Mq9q
-END PGP SIGNATURE-
diff -Nru ovito-2.9.0+dfsg1/debian/changelog ovito-2.9.0+dfsg1/debian/changelog
--- ovito-2.9.0+dfsg1/debian/changelog  2017-08-10 19:44:59.0 +0200
+++ ovito-2.9.0+dfsg1/debian/changelog  2017-10-16 12:24:21.0 +0200
@@ -1,3 +1,10 @@
+ovito (2.9.0+dfsg1-2.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Force using default Python 3 interpreter
+
+ -- Gilles Filippini   Mon, 16 Oct 2017 12:24:21 +0200
+
 ovito (2.9.0+dfsg1-2) unstable; urgency=medium
 
   * [cdb5bde] Fix FTBFS on archs, where char is unsigned. (Closes: #871248)
diff -Nru ovito-2.9.0+dfsg1/debian/rules ovito-2.9.0+dfsg1/debian/rules
--- ovito-2.9.0+dfsg1/debian/rules  2017-08-06 23:51:10.0 +0200
+++ ovito-2.9.0+dfsg1/debian/rules  2017-10-16 12:24:17.0 +0200
@@ -5,6 +5,7 @@
dh $@ --parallel
 
 extra_flags += \
+   -DPYTHON_EXECUTABLE=/usr/bin/python3 \
-DOVITO_BUILD_DOCUMENTATION=TRUE \
-DOVITO_BUILD_PLUGIN_SCRIPTING=TRUE \
-DOVITO_BUILD_PLUGIN_NETCDF=TRUE \
--- End Message ---
--- Begin Message ---
Source: ovito
Source-Version: 2.9.0+dfsg1-3

We believe that the bug you reported is fixed in the latest version of
ovito, which is due to be installed in the Debian FTP archive.

A summary of the changes

Bug#859226: marked as done (m2ext: Please migrate to openssl1.1 in buster)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 21:10:25 +
with message-id 
and subject line Bug#859226: fixed in m2ext 0.1-1.2
has caused the Debian Bug report #859226,
regarding m2ext: Please migrate to openssl1.1 in buster
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
859226: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859226
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: m2ext
Version: 0.1-1
Severity: serious
Control: block 827061 by -1

m2crypto will probably go with libssl1.0 for Stretch and m2ext should
use the same library.

Sebastian
--- End Message ---
--- Begin Message ---
Source: m2ext
Source-Version: 0.1-1.2

We believe that the bug you reported is fixed in the latest version of
m2ext, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 859...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sebastian Andrzej Siewior  (supplier of updated m2ext 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 13 Nov 2017 21:31:11 +0100
Source: m2ext
Binary: python-m2ext
Architecture: source
Version: 0.1-1.2
Distribution: unstable
Urgency: medium
Maintainer: Debian Python Modules Team 

Changed-By: Sebastian Andrzej Siewior 
Description:
 python-m2ext - Extensions to the M2Crypto Python package
Closes: 859226
Changes:
 m2ext (0.1-1.2) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Switch back to libssl-dev since m2crypto did it, too (Closes: #859226).
Checksums-Sha1:
 b161d5152d162b420481883a85b606966873fbf1 1970 m2ext_0.1-1.2.dsc
 9057571c4c4801a173271a884d686f21c965111e 1964 m2ext_0.1-1.2.debian.tar.xz
 8b15f2d18884b60233b48b2d7ed874e80f413130 6501 m2ext_0.1-1.2_source.buildinfo
Checksums-Sha256:
 7fe2ded1434bfc0b1f08a73949301cf0fbbb175a460606b81ed15ac364b67df7 1970 
m2ext_0.1-1.2.dsc
 41a69112570c83ea110f63e5e7d596dad0b52c1e0ce3ce1eed6ee7a4fb734beb 1964 
m2ext_0.1-1.2.debian.tar.xz
 0f6737ba78846018f304c557ddb52c8b61cebe5584779d1d7464b6abe88dd225 6501 
m2ext_0.1-1.2_source.buildinfo
Files:
 2b3e6c3475420c1b1d2b5dade5b61e5d 1970 python optional m2ext_0.1-1.2.dsc
 c672397d1231d128b40d62b8e577d7b0 1964 python optional 
m2ext_0.1-1.2.debian.tar.xz
 da0716dc4929b485ab84dc8d74b4b2ef 6501 python optional 
m2ext_0.1-1.2_source.buildinfo

-BEGIN PGP SIGNATURE-
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=AXQ6
-END PGP SIGNATURE End Message ---


Bug#879952: marked as done (qt3d5-dev-tools: fails to upgrade from 'stable' to 'sid' - trying to overwrite /usr/lib/x86_64-linux-gnu/qt5/bin/qgltf)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 21:11:12 +
with message-id 
and subject line Bug#879952: fixed in qt3d-opensource-src 5.9.2+dfsg-3
has caused the Debian Bug report #879952,
regarding qt3d5-dev-tools: fails to upgrade from 'stable' to 'sid' - trying to 
overwrite /usr/lib/x86_64-linux-gnu/qt5/bin/qgltf
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
879952: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879952
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: qt3d5-dev-tools
Version: 5.9.2+dfsg-2
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts

Hi,

during a test with piuparts I noticed your package fails to upgrade from
'stable'.
It installed fine in 'stable', then the upgrade to 'sid' fails
because it tries to overwrite other packages files without declaring a
Breaks+Replaces relation.

See policy 7.6 at
https://www.debian.org/doc/debian-policy/ch-relationships.html#s-replaces

This test intentionally skipped 'testing' to find file overwrite
problems before packages migrate from 'unstable' to 'testing'.

>From the attached log (scroll to the bottom...):

  Selecting previously unselected package qt3d5-dev-tools.
  Preparing to unpack .../qt3d5-dev-tools_5.9.2+dfsg-2_amd64.deb ...
  Unpacking qt3d5-dev-tools (5.9.2+dfsg-2) ...
  dpkg: error processing archive 
/var/cache/apt/archives/qt3d5-dev-tools_5.9.2+dfsg-2_amd64.deb (--unpack):
   trying to overwrite '/usr/lib/x86_64-linux-gnu/qt5/bin/qgltf', which is also 
in package qt3d-assimpsceneio-plugin:amd64 5.7.1+dfsg-2
  Errors were encountered while processing:
   /var/cache/apt/archives/qt3d5-dev-tools_5.9.2+dfsg-2_amd64.deb


cheers,

Andreas


qt3d-assimpsceneio-plugin=5.7.1+dfsg-2_qt3d5-dev-tools=5.9.2+dfsg-2.log.gz
Description: application/gzip
--- End Message ---
--- Begin Message ---
Source: qt3d-opensource-src
Source-Version: 5.9.2+dfsg-3

We believe that the bug you reported is fixed in the latest version of
qt3d-opensource-src, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 879...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Dmitry Shachnev  (supplier of updated qt3d-opensource-src 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 18 Nov 2017 22:43:29 +0300
Source: qt3d-opensource-src
Binary: libqt53dcore5 libqt53dquick5 libqt53dquickrender5 libqt53dinput5 
libqt53drender5 libqt53dlogic5 libqt53dquickinput5 libqt53dquickextras5 
libqt53dextras5 libqt53dquickscene2d5 libqt53danimation5 
libqt53dquickanimation5 qt3d5-dev-tools qt3d-gltfsceneio-plugin 
qt3d-assimpsceneimport-plugin qt3d-defaultgeometryloader-plugin 
qt3d-scene2d-plugin qml-module-qt3d qml-module-qtquick-scene3d 
qml-module-qtquick-scene2d qt3d5-dev qt3d5-examples qt3d5-doc qt3d5-doc-html
Architecture: source
Version: 5.9.2+dfsg-3
Distribution: unstable
Urgency: medium
Maintainer: Debian Qt/KDE Maintainers 
Changed-By: Dmitry Shachnev 
Description:
 libqt53danimation5 - Qt 3D animation module
 libqt53dcore5 - Qt 3D module
 libqt53dextras5 - Qt 3D extras
 libqt53dinput5 - Qt 3D Input module
 libqt53dlogic5 - Qt 3D logic module
 libqt53dquick5 - Qt 3D Quick module
 libqt53dquickanimation5 - Qt 3D Quick animation module
 libqt53dquickextras5 - Qt 3D Quick extras
 libqt53dquickinput5 - Qt 3D Quick input
 libqt53dquickrender5 - Qt 3D Quick Renderer module
 libqt53dquickscene2d5 - Qt 3D Quick scene module
 libqt53drender5 - Qt 3D Renderer module
 qml-module-qt3d - Qt 5 3D QML module
 qml-module-qtquick-scene2d - Qt 5 Quick Scene 2D QML module
 qml-module-qtquick-scene3d - Qt 5 Quick Scene 3D QML module
 qt3d-assimpsceneimport-plugin - Qt 3D GL Assimp scene import plugin
 qt3d-defaultgeometryloader-plugin - Qt 3D default geometry loader plugin
 qt3d-gltfsceneio-plugin - Qt 3D GL Transmission Format scene IO plugin
 qt3d-scene2d-plugin - Qt 3D Scene 2D plugin
 qt3d5-dev  - Qt 5 3D development files
 qt3d5-dev-tools - Qt 3D development tools
 qt3d5-doc  - Qt 3D documentation
 qt3d5-doc-html - Qt 3D HTML documentation
 qt3d5-examples - Qt 5 3d examples
Closes: 879952
Changes:
 qt3d-opensource-src (5.9.2+dfsg-3) unstable; urgency=med

Bug#864818: marked as done (python-tablib: CVE-2017-2810)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 21:32:11 +
with message-id 
and subject line Bug#864818: fixed in python-tablib 0.9.11-2+deb9u1
has caused the Debian Bug report #864818,
regarding python-tablib: CVE-2017-2810
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
864818: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864818
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: python-tablib
Version: 0.9.11-2
Severity: grave
Tags: upstream patch security
Justification: user security hole

Hi,

the following vulnerability was published for python-tablib.

CVE-2017-2810[0]:
| An exploitable vulnerability exists in the Databook loading
| functionality of Tablib 0.11.4. A yaml loaded Databook can execute
| arbitrary python commands resulting in command execution. An attacker
| can insert python into loaded yaml to trigger this vulnerability.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-2810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2810
[1] https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0307
[2] 
https://github.com/kennethreitz/tablib/commit/69abfc3ada5d754cb152119c0b4777043657cb6e

For stretch and jessie, we quickly discussed that on IRC, and given
there are not reverse dependencies and low popcon/usage, we suggest to
have the fix going via a future point release, can you contact the
release team for that?

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: python-tablib
Source-Version: 0.9.11-2+deb9u1

We believe that the bug you reported is fixed in the latest version of
python-tablib, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 864...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Thomas Goirand  (supplier of updated python-tablib package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 24 Oct 2017 21:15:19 +0200
Source: python-tablib
Binary: python-tablib
Architecture: source all
Version: 0.9.11-2+deb9u1
Distribution: stretch
Urgency: low
Maintainer: PKG OpenStack 
Changed-By: Thomas Goirand 
Description:
 python-tablib - format agnostic tabular dataset library
Closes: 864818
Changes:
 python-tablib (0.9.11-2+deb9u1) stretch; urgency=low
 .
   * CVE-2017-2810: apply upstream patch: use safe load (Closes: #864818).
Checksums-Sha1:
 7c6f83acf14cd7f6057ed39ca3c7c05bfce51a10 2221 python-tablib_0.9.11-2+deb9u1.dsc
 8042ccfb88e6e58aaaf848966355b5bb58e02b65 3236 
python-tablib_0.9.11-2+deb9u1.debian.tar.xz
 1f706f3f67a41d3a5aa6e996eda7bebd6ea661b5 253880 
python-tablib_0.9.11-2+deb9u1_all.deb
 bf361bc093643d58b943a36f2a5d78c1c0527156 7741 
python-tablib_0.9.11-2+deb9u1_amd64.buildinfo
Checksums-Sha256:
 285ff404e3e7b511dae53951c12e1ae75b85e561fcecd9dd97c47ebdf19dce8f 2221 
python-tablib_0.9.11-2+deb9u1.dsc
 6fbf0e161d33e3b8483ff07c9650ae41d2fcc966bed495536b31c051198e57cd 3236 
python-tablib_0.9.11-2+deb9u1.debian.tar.xz
 f0f72c9ca79b2fec3266ab3faddac328aebe711685f50cf5c687528d963d1391 253880 
python-tablib_0.9.11-2+deb9u1_all.deb
 a349d56683aa1e19ab7857662583eb070d9784fe03d983c46f93b78413c655fa 7741 
python-tablib_0.9.11-2+deb9u1_amd64.buildinfo
Files:
 99b5d445d2b1cdf72e36227b287aa37c 2221 python optional 
python-tablib_0.9.11-2+deb9u1.dsc
 0199b637493f39f12a64aa70d50683a6 3236 python optional 
python-tablib_0.9.11-2+deb9u1.debian.tar.xz
 745e306a9aab701d65dcc78f746a2625 253880 python optional 
python-tablib_0.9.11-2+deb9u1_all.deb
 fb051ccf0e30868f82bdb8d80375e483 7741 python optional 
python-tablib_0.9.11-2+deb9u1_amd64.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCAAdFiEEoLGp81CJVhMOekJc1BatFaxrQ/4FAlnvkXEACgkQ1BatFaxr
Q/7F3g/9G4eGh2R+9l2XMME1MOOlR9w7AVlLoFTA/SYqzuaFqtCvz7rhkvSQewI0
UNs2Xw+ttBMiufe9UQpAnOnPdhF57UJqxErnQvpTXzqrPtOn5Amc+fBy0O05AfsN
RsFC9NpH1IxU446nTUvCMon/r9590EuHOm6rPRw3QZZccp2FrIIp5RR62VKDryGn
2HTCVV9lNrAklaeOnytmDdotoLgWPzVZ3w5pQ94vaQ6HCfwkqvqB1rJrIbjduvRo
BxvILz2695Mfg7QP+qZzETVZBg8FndesacP6ClV67UE7GGDwBJFPbnG4xDTR5At+
8KP6OXX0UGXgQZ4

Bug#882095: python-pyrax FTBFS: test failures

2017-11-18 Thread Adrian Bunk
Source: python-pyrax
Version: 1.9.8-1
Severity: serious

Some recent change in unstable makes python-pyrax FTBFS:

https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/python-pyrax.html

...
==
ERROR: tests.unit.test_autoscale (unittest.loader.ModuleImportFailure)
--
ImportError: Failed to import test module: tests.unit.test_autoscale
Traceback (most recent call last):
  File "/usr/lib/python2.7/unittest/loader.py", line 254, in _find_tests
module = self._get_module_from_name(name)
  File "/usr/lib/python2.7/unittest/loader.py", line 232, in 
_get_module_from_name
__import__(name)
  File "tests/unit/test_autoscale.py", line 10, in 
import pyrax
  File "pyrax/__init__.py", line 58, in 
from novaclient import auth_plugin as _cs_auth_plugin
ImportError: cannot import name auth_plugin


==
ERROR: tests.unit.test_client (unittest.loader.ModuleImportFailure)
--
ImportError: Failed to import test module: tests.unit.test_client
Traceback (most recent call last):
  File "/usr/lib/python2.7/unittest/loader.py", line 254, in _find_tests
module = self._get_module_from_name(name)
  File "/usr/lib/python2.7/unittest/loader.py", line 232, in 
_get_module_from_name
__import__(name)
  File "tests/unit/test_client.py", line 16, in 
import pyrax
  File "pyrax/__init__.py", line 52, in 
from . import exceptions as exc
ImportError: cannot import name exceptions


==
ERROR: tests.unit.test_cloud_blockstorage (unittest.loader.ModuleImportFailure)
--
ImportError: Failed to import test module: tests.unit.test_cloud_blockstorage
Traceback (most recent call last):
  File "/usr/lib/python2.7/unittest/loader.py", line 254, in _find_tests
module = self._get_module_from_name(name)
  File "/usr/lib/python2.7/unittest/loader.py", line 232, in 
_get_module_from_name
__import__(name)
  File "tests/unit/test_cloud_blockstorage.py", line 10, in 
import pyrax.cloudblockstorage
  File "pyrax/__init__.py", line 52, in 
from . import exceptions as exc
ImportError: cannot import name exceptions


==
ERROR: tests.unit.test_cloud_cdn (unittest.loader.ModuleImportFailure)
--
ImportError: Failed to import test module: tests.unit.test_cloud_cdn
Traceback (most recent call last):
  File "/usr/lib/python2.7/unittest/loader.py", line 254, in _find_tests
module = self._get_module_from_name(name)
  File "/usr/lib/python2.7/unittest/loader.py", line 232, in 
_get_module_from_name
__import__(name)
  File "tests/unit/test_cloud_cdn.py", line 5, in 
from pyrax.cloudcdn import CloudCDNClient
  File "pyrax/__init__.py", line 52, in 
from . import exceptions as exc
ImportError: cannot import name exceptions


==
ERROR: tests.unit.test_cloud_databases (unittest.loader.ModuleImportFailure)
--
ImportError: Failed to import test module: tests.unit.test_cloud_databases
Traceback (most recent call last):
  File "/usr/lib/python2.7/unittest/loader.py", line 254, in _find_tests
module = self._get_module_from_name(name)
  File "/usr/lib/python2.7/unittest/loader.py", line 232, in 
_get_module_from_name
__import__(name)
  File "tests/unit/test_cloud_databases.py", line 9, in 
from pyrax.clouddatabases import CloudDatabaseBackupManager
  File "pyrax/__init__.py", line 52, in 
from . import exceptions as exc
ImportError: cannot import name exceptions


==
ERROR: tests.unit.test_cloud_dns (unittest.loader.ModuleImportFailure)
--
ImportError: Failed to import test module: tests.unit.test_cloud_dns
Traceback (most recent call last):
  File "/usr/lib/python2.7/unittest/loader.py", line 254, in _find_tests
module = self._get_module_from_name(name)
  File "/usr/lib/python2.7/unittest/loader.py", line 232, in 
_get_module_from_name
__import__(name)
  File "tests/unit/test_cloud_dns.py", line 12, in 
import pyrax
  File "pyrax/__init__.py", line 52, in 
from . import exceptions as exc
ImportError: cannot import name exceptions


==
ERROR: tests.unit.test_cloud_loadbalancers (unittest.loader.ModuleImportFailure)
--
ImportError: Failed to impor

Bug#868469: marked as done (imagemagick: CVE-2017-11352 (Incomplete fix for CVE-2017-9144))

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 22:18:45 +
with message-id 
and subject line Bug#868469: fixed in imagemagick 8:6.8.9.9-5+deb8u11
has caused the Debian Bug report #868469,
regarding imagemagick: CVE-2017-11352 (Incomplete fix for CVE-2017-9144)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
868469: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868469
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: serious
Tags: upstream patch security
Justification: incomplete fix for previous security fix
Forwarded: https://github.com/ImageMagick/ImageMagick/issues/502
Control: fixed -1 8:6.9.7.4+dfsg-12
Control: found -1 8:6.9.7.4+dfsg-9
Control: found -1 8:6.8.9.9-5+deb8u9

As noted in the upstream bug [1] the original fix for CVE-2017-9144
was incomplete.

 [1] https://github.com/ImageMagick/ImageMagick/issues/502

As the incomplete fix has security implications itself (DoS at least?)
this might warrant a new CVE id.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.8.9.9-5+deb8u11

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 868...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Muehlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 16 Nov 2017 23:13:59 +0100
Source: imagemagick
Binary: imagemagick-common imagemagick-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers imagemagick libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-2 
libmagickcore-6.q16-2-extra libmagickcore-6.q16-dev libmagickwand-6.q16-2 
libmagickwand-6.q16-dev libmagick++-6.q16-5 libmagick++-6.q16-dev 
imagemagick-dbg libimage-magick-q16-perl perlmagick libmagickcore-dev 
libmagickwand-dev libmagick++-dev
Architecture: source all amd64
Version: 8:6.8.9.9-5+deb8u11
Distribution: jessie-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Muehlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-common - image manipulation programs -- infrastructure
 imagemagick-dbg - debugging symbols for ImageMagick
 imagemagick-doc - document files of ImageMagick
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-5 - object-oriented C++ interface to ImageMagick
 libmagick++-6.q16-dev - object-oriented C++ interface to ImageMagick - 
development files
 libmagick++-dev - object-oriented C++ interface to ImageMagick
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library - header files
 libmagickcore-6.q16-2 - low-level image manipulation library -- quantum depth 
Q16
 libmagickcore-6.q16-2-extra - low-level image manipulation library - extra 
codecs (Q16)
 libmagickcore-6.q16-dev - low-level image manipulation library - development 
files (Q16)
 libmagickcore-dev - low-level image manipulation library -- transition package
 libmagickwand-6-headers - image manipulation library - headers files
 libmagickwand-6.q16-2 - image manipulation library
 libmagickwand-6.q16-dev - image manipulation library - development files
 libmagickwand-dev - image manipulation library - transition for development 
files
 perlmagick - Perl interface to ImageMagick -- transition package
Closes: 868469 869715 869728 870067 870106 870109 872373 873099 873134 876097 
876488 878507 878508 878527 878562 878578 881392
Changes:
 imagemagick (8:6.8.9.9-5+deb8u11) jessie-security; urgency=medium
 .
   * Multiple security fixes
 CVE-2017-12983 (Closes: #873134)
 CVE-2017-13134 (Closes: #873099)
 CVE-2

Bug#872373: marked as done (CVE-2017-12877)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 22:18:45 +
with message-id 
and subject line Bug#872373: fixed in imagemagick 8:6.8.9.9-5+deb8u11
has caused the Debian Bug report #872373,
regarding CVE-2017-12877
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
872373: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872373
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: imagemagick
Version: 8:6.9.7.4+dfsg-16
Severity: grave
Tags: security

This was assigned CVE-2017-12877:
https://github.com/ImageMagick/ImageMagick/issues/662
https://github.com/ImageMagick/ImageMagick/commit/98dda239ec398dd56453460849b4c9057fc424e5

Cheers,
Moritz
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.8.9.9-5+deb8u11

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 872...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Muehlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 16 Nov 2017 23:13:59 +0100
Source: imagemagick
Binary: imagemagick-common imagemagick-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers imagemagick libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-2 
libmagickcore-6.q16-2-extra libmagickcore-6.q16-dev libmagickwand-6.q16-2 
libmagickwand-6.q16-dev libmagick++-6.q16-5 libmagick++-6.q16-dev 
imagemagick-dbg libimage-magick-q16-perl perlmagick libmagickcore-dev 
libmagickwand-dev libmagick++-dev
Architecture: source all amd64
Version: 8:6.8.9.9-5+deb8u11
Distribution: jessie-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Muehlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-common - image manipulation programs -- infrastructure
 imagemagick-dbg - debugging symbols for ImageMagick
 imagemagick-doc - document files of ImageMagick
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-5 - object-oriented C++ interface to ImageMagick
 libmagick++-6.q16-dev - object-oriented C++ interface to ImageMagick - 
development files
 libmagick++-dev - object-oriented C++ interface to ImageMagick
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library - header files
 libmagickcore-6.q16-2 - low-level image manipulation library -- quantum depth 
Q16
 libmagickcore-6.q16-2-extra - low-level image manipulation library - extra 
codecs (Q16)
 libmagickcore-6.q16-dev - low-level image manipulation library - development 
files (Q16)
 libmagickcore-dev - low-level image manipulation library -- transition package
 libmagickwand-6-headers - image manipulation library - headers files
 libmagickwand-6.q16-2 - image manipulation library
 libmagickwand-6.q16-dev - image manipulation library - development files
 libmagickwand-dev - image manipulation library - transition for development 
files
 perlmagick - Perl interface to ImageMagick -- transition package
Closes: 868469 869715 869728 870067 870106 870109 872373 873099 873134 876097 
876488 878507 878508 878527 878562 878578 881392
Changes:
 imagemagick (8:6.8.9.9-5+deb8u11) jessie-security; urgency=medium
 .
   * Multiple security fixes
 CVE-2017-12983 (Closes: #873134)
 CVE-2017-13134 (Closes: #873099)
 CVE-2017-13769 (Closes: #878507)
 CVE-2017-14224 (Closes: #876097)
 CVE-2017-14607 (Closes: #878527)
 CVE-2017-14682 (Closes: #876488)
 CVE-2017-14989 (Closes: #878562)
 CVE-2017-15277 (Closes: #878578)
 CVE-2017-11352 (Closes: #868469)
 CVE-2017-11640 (Closes: #870067)
 CVE-2017-12431 (Closes: #869715)
 CVE-2017-12640 (Closes

Bug#873099: marked as done (imagemagick: CVE-2017-13134)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 22:18:45 +
with message-id 
and subject line Bug#873099: fixed in imagemagick 8:6.8.9.9-5+deb8u11
has caused the Debian Bug report #873099,
regarding imagemagick: CVE-2017-13134
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
873099: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873099
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: important
Tags: security patch upstream
Forwarded: https://github.com/ImageMagick/ImageMagick/issues/670

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-13134[0]:
| In ImageMagick 7.0.6-6, a heap-based buffer over-read was found in the
| function SFWScan in coders/sfw.c, which allows attackers to cause a
| denial of service via a crafted file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-13134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.8.9.9-5+deb8u11

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 873...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Muehlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 16 Nov 2017 23:13:59 +0100
Source: imagemagick
Binary: imagemagick-common imagemagick-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers imagemagick libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-2 
libmagickcore-6.q16-2-extra libmagickcore-6.q16-dev libmagickwand-6.q16-2 
libmagickwand-6.q16-dev libmagick++-6.q16-5 libmagick++-6.q16-dev 
imagemagick-dbg libimage-magick-q16-perl perlmagick libmagickcore-dev 
libmagickwand-dev libmagick++-dev
Architecture: source all amd64
Version: 8:6.8.9.9-5+deb8u11
Distribution: jessie-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Muehlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-common - image manipulation programs -- infrastructure
 imagemagick-dbg - debugging symbols for ImageMagick
 imagemagick-doc - document files of ImageMagick
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-5 - object-oriented C++ interface to ImageMagick
 libmagick++-6.q16-dev - object-oriented C++ interface to ImageMagick - 
development files
 libmagick++-dev - object-oriented C++ interface to ImageMagick
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library - header files
 libmagickcore-6.q16-2 - low-level image manipulation library -- quantum depth 
Q16
 libmagickcore-6.q16-2-extra - low-level image manipulation library - extra 
codecs (Q16)
 libmagickcore-6.q16-dev - low-level image manipulation library - development 
files (Q16)
 libmagickcore-dev - low-level image manipulation library -- transition package
 libmagickwand-6-headers - image manipulation library - headers files
 libmagickwand-6.q16-2 - image manipulation library
 libmagickwand-6.q16-dev - image manipulation library - development files
 libmagickwand-dev - image manipulation library - transition for development 
files
 perlmagick - Perl interface to ImageMagick -- transition package
Closes: 868469 869715 869728 870067 870106 870109 872373 873099 873134 876097 
876488 878507 878508 878527 878562 878578 881392
Changes:
 imagemag

Bug#870848: marked as done (jackson-databind: CVE-2017-7525: Deserialization vulnerability via readValue method of ObjectMapper)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 22:19:00 +
with message-id 
and subject line Bug#870848: fixed in jackson-databind 2.4.2-2+deb8u1
has caused the Debian Bug report #870848,
regarding jackson-databind: CVE-2017-7525: Deserialization vulnerability via 
readValue method of ObjectMapper
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
870848: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870848
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: jackson-databind
Version: 2.8.6-1
Severity: grave
Tags: security upstream
Forwarded: https://github.com/FasterXML/jackson-databind/issues/1599

Hi,

the following vulnerability was published for jackson-databind.

CVE-2017-7525[0]:
Deserialization vulnerability via readValue method of ObjectMapper

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

Upstream tracking is at [2].

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-7525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7525
[1] https://github.com/FasterXML/jackson-databind/issues/1599
[2] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7525

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: jackson-databind
Source-Version: 2.4.2-2+deb8u1

We believe that the bug you reported is fixed in the latest version of
jackson-databind, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 870...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Markus Koschany  (supplier of updated jackson-databind package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 19 Oct 2017 01:44:42 +0200
Source: jackson-databind
Binary: libjackson2-databind-java libjackson2-databind-java-doc
Architecture: source all
Version: 2.4.2-2+deb8u1
Distribution: jessie-security
Urgency: high
Maintainer: Debian Java Maintainers 

Changed-By: Markus Koschany 
Description:
 libjackson2-databind-java - fast and powerful JSON library for Java -- data 
binding
 libjackson2-databind-java-doc - Documentation for jackson-databind
Closes: 870848
Changes:
 jackson-databind (2.4.2-2+deb8u1) jessie-security; urgency=high
 .
   * Team upload.
   * Fix CVE-2017-7525: Deserialization vulnerability via readValue
 method of ObjectMapper. (Closes: #870848)
Checksums-Sha1:
 bed1c6ec546555eb0e49ccaea6857242ef849cf3 2688 
jackson-databind_2.4.2-2+deb8u1.dsc
 aaec538f967e8cd0bbff405eef753d10ba2df664 851898 
jackson-databind_2.4.2.orig.tar.gz
 1ae7f0fdae862453a3f0ae6f76f13c053a87e59e 6220 
jackson-databind_2.4.2-2+deb8u1.debian.tar.xz
 95e9a700283eb51c8032018f4986828350058395 985394 
libjackson2-databind-java_2.4.2-2+deb8u1_all.deb
 a879aefe50adfc4823b1d076edef6fc016cdfcab 4749164 
libjackson2-databind-java-doc_2.4.2-2+deb8u1_all.deb
Checksums-Sha256:
 8160da76d47ac9d45241761140b61cc26e9dd071a36e8614250764b473634dfd 2688 
jackson-databind_2.4.2-2+deb8u1.dsc
 06d8378c6ab40aca83354acf625969801e014a447756ad07e16365925ddf3aa1 851898 
jackson-databind_2.4.2.orig.tar.gz
 565f027fdb76103557f7e34236c269fa52459c32bc9174eeadbf5d30e0e84230 6220 
jackson-databind_2.4.2-2+deb8u1.debian.tar.xz
 aec403bf86dd9d1c02ba956518fd64c5ed9b8c4df9ee3bae9f4edc205fa5 985394 
libjackson2-databind-java_2.4.2-2+deb8u1_all.deb
 088dd770a71d875faaee183ad9f7c7e5e9c5ffbd66bdd8432225971b47274edb 4749164 
libjackson2-databind-java-doc_2.4.2-2+deb8u1_all.deb
Files:
 659b09d354809dc185c3cea754e24703 2688 java optional 
jackson-databind_2.4.2-2+deb8u1.dsc
 a3cef86907e85f401571db6d5d5ae358 851898 java optional 
jackson-databind_2.4.2.orig.tar.gz
 b0b2c0c073904b9299d50f6e62272912 6220 java optional 
jackson-databind_2.4.2-2+deb8u1.debian.tar.xz
 b71da66cc63df8ec0ad08a551fa02958 985394 java optional 
libjackson2-databind-java_2.4.2-2+deb8u1_all.deb
 422670e2acd0adb48667c8cd7dd38568 4749164 doc optional 
libjackson2-databind-java-doc_2.4.2-2+deb8u1_all.deb

-BEGIN PGP SIGNATURE-

iQKjBAEBCgCNFiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAlno6DtfFIAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub

Bug#876097: marked as done (imagemagick: CVE-2017-14224: Heap buffer overflow in WritePCXImage)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 22:18:45 +
with message-id 
and subject line Bug#876097: fixed in imagemagick 8:6.8.9.9-5+deb8u11
has caused the Debian Bug report #876097,
regarding imagemagick: CVE-2017-14224: Heap buffer overflow in WritePCXImage
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
876097: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876097
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: important
Tags: upstream security patch
Forwarded: https://github.com/ImageMagick/ImageMagick/issues/733

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-14224[0]:
| A heap-based buffer overflow in WritePCXImage in coders/pcx.c in
| ImageMagick 7.0.6-8 Q16 allows remote attackers to cause a denial of
| service or code execution via a crafted file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-14224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224
[1] https://github.com/ImageMagick/ImageMagick/issues/733

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.8.9.9-5+deb8u11

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 876...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Muehlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 16 Nov 2017 23:13:59 +0100
Source: imagemagick
Binary: imagemagick-common imagemagick-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers imagemagick libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-2 
libmagickcore-6.q16-2-extra libmagickcore-6.q16-dev libmagickwand-6.q16-2 
libmagickwand-6.q16-dev libmagick++-6.q16-5 libmagick++-6.q16-dev 
imagemagick-dbg libimage-magick-q16-perl perlmagick libmagickcore-dev 
libmagickwand-dev libmagick++-dev
Architecture: source all amd64
Version: 8:6.8.9.9-5+deb8u11
Distribution: jessie-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Muehlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-common - image manipulation programs -- infrastructure
 imagemagick-dbg - debugging symbols for ImageMagick
 imagemagick-doc - document files of ImageMagick
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-5 - object-oriented C++ interface to ImageMagick
 libmagick++-6.q16-dev - object-oriented C++ interface to ImageMagick - 
development files
 libmagick++-dev - object-oriented C++ interface to ImageMagick
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library - header files
 libmagickcore-6.q16-2 - low-level image manipulation library -- quantum depth 
Q16
 libmagickcore-6.q16-2-extra - low-level image manipulation library - extra 
codecs (Q16)
 libmagickcore-6.q16-dev - low-level image manipulation library - development 
files (Q16)
 libmagickcore-dev - low-level image manipulation library -- transition package
 libmagickwand-6-headers - image manipulation library - headers files
 libmagickwand-6.q16-2 - image manipulation library
 libmagickwand-6.q16-dev - image manipulation library - development files
 libmagickwand-dev - image manipulation library - transition for development 
files
 perlmagick - Perl interface to ImageMagick -- transition package
Closes: 868469 869715 869728 870067 870106 870

Bug#873134: marked as done (imagemagick: CVE-2017-12983)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 22:18:45 +
with message-id 
and subject line Bug#873134: fixed in imagemagick 8:6.8.9.9-5+deb8u11
has caused the Debian Bug report #873134,
regarding imagemagick: CVE-2017-12983
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
873134: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873134
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: important
Tags: security patch upstream
Forwarded: https://github.com/ImageMagick/ImageMagick/issues/682

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-12983[0]:
| Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c
| in ImageMagick 7.0.6-8 allows remote attackers to cause a denial of
| service (application crash) or possibly have unspecified other impact
| via a crafted file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-12983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983
[1] https://github.com/ImageMagick/ImageMagick/issues/682

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.8.9.9-5+deb8u11

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 873...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Muehlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 16 Nov 2017 23:13:59 +0100
Source: imagemagick
Binary: imagemagick-common imagemagick-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers imagemagick libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-2 
libmagickcore-6.q16-2-extra libmagickcore-6.q16-dev libmagickwand-6.q16-2 
libmagickwand-6.q16-dev libmagick++-6.q16-5 libmagick++-6.q16-dev 
imagemagick-dbg libimage-magick-q16-perl perlmagick libmagickcore-dev 
libmagickwand-dev libmagick++-dev
Architecture: source all amd64
Version: 8:6.8.9.9-5+deb8u11
Distribution: jessie-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Muehlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-common - image manipulation programs -- infrastructure
 imagemagick-dbg - debugging symbols for ImageMagick
 imagemagick-doc - document files of ImageMagick
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-5 - object-oriented C++ interface to ImageMagick
 libmagick++-6.q16-dev - object-oriented C++ interface to ImageMagick - 
development files
 libmagick++-dev - object-oriented C++ interface to ImageMagick
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library - header files
 libmagickcore-6.q16-2 - low-level image manipulation library -- quantum depth 
Q16
 libmagickcore-6.q16-2-extra - low-level image manipulation library - extra 
codecs (Q16)
 libmagickcore-6.q16-dev - low-level image manipulation library - development 
files (Q16)
 libmagickcore-dev - low-level image manipulation library -- transition package
 libmagickwand-6-headers - image manipulation library - headers files
 libmagickwand-6.q16-2 - image manipulation library
 libmagickwand-6.q16-dev - image manipulation library - development files
 libmagickwand-dev - image manipulation library - transition for development 
files
 perlmagick - Perl interface to ImageMagick -- transition package
Closes: 868469 869715 869728 8700

Bug#869728: marked as done (imagemagick: CVE-2017-13144)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 22:18:45 +
with message-id 
and subject line Bug#869728: fixed in imagemagick 8:6.8.9.9-5+deb8u11
has caused the Debian Bug report #869728,
regarding imagemagick: CVE-2017-13144
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
869728: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869728
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: src:imagemagick
Version: 8:6.9.7.4+dfsg-12
Severity: serious
Tags: security upstream
X-Debbugs-CC: t...@security.debian.org
control: found -1 8:6.8.9.9-5+deb8u8
control: found -1 8:6.8.9.9-5+deb8u9
control: found -1 8:6.7.7.10-5+deb7u14
control: found -1 8:6.7.7.10-5+deb7u4
forwarded:  
https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=31438

Avoid a crash for mpc coder
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.8.9.9-5+deb8u11

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 869...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Muehlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 16 Nov 2017 23:13:59 +0100
Source: imagemagick
Binary: imagemagick-common imagemagick-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers imagemagick libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-2 
libmagickcore-6.q16-2-extra libmagickcore-6.q16-dev libmagickwand-6.q16-2 
libmagickwand-6.q16-dev libmagick++-6.q16-5 libmagick++-6.q16-dev 
imagemagick-dbg libimage-magick-q16-perl perlmagick libmagickcore-dev 
libmagickwand-dev libmagick++-dev
Architecture: source all amd64
Version: 8:6.8.9.9-5+deb8u11
Distribution: jessie-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Muehlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-common - image manipulation programs -- infrastructure
 imagemagick-dbg - debugging symbols for ImageMagick
 imagemagick-doc - document files of ImageMagick
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-5 - object-oriented C++ interface to ImageMagick
 libmagick++-6.q16-dev - object-oriented C++ interface to ImageMagick - 
development files
 libmagick++-dev - object-oriented C++ interface to ImageMagick
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library - header files
 libmagickcore-6.q16-2 - low-level image manipulation library -- quantum depth 
Q16
 libmagickcore-6.q16-2-extra - low-level image manipulation library - extra 
codecs (Q16)
 libmagickcore-6.q16-dev - low-level image manipulation library - development 
files (Q16)
 libmagickcore-dev - low-level image manipulation library -- transition package
 libmagickwand-6-headers - image manipulation library - headers files
 libmagickwand-6.q16-2 - image manipulation library
 libmagickwand-6.q16-dev - image manipulation library - development files
 libmagickwand-dev - image manipulation library - transition for development 
files
 perlmagick - Perl interface to ImageMagick -- transition package
Closes: 868469 869715 869728 870067 870106 870109 872373 873099 873134 876097 
876488 878507 878508 878527 878562 878578 881392
Changes:
 imagemagick (8:6.8.9.9-5+deb8u11) jessie-security; urgency=medium
 .
   * Multiple security fixes
 CVE-2017-12983 (Closes: #873134)
 CVE-2017-13134 (Closes: #873099)
 CVE-2017-13769 (Closes: #878507)
 CVE-2017-14224 (Closes: #876097)
 CVE-2017-14607 (Closes: #878527)
 CVE-2017-14682 (Closes: #876488)
 CVE-2017-14989 (Closes: #878562)
 CVE-2017-15277 (Closes: #878578)
 CVE-2017-1

Bug#876488: marked as done (imagemagick: CVE-2017-14682: Heap buffer overflow in GetNextToken())

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 22:18:45 +
with message-id 
and subject line Bug#876488: fixed in imagemagick 8:6.8.9.9-5+deb8u11
has caused the Debian Bug report #876488,
regarding imagemagick: CVE-2017-14682: Heap buffer overflow in GetNextToken()
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
876488: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876488
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: grave
Tags: upstream security patch
Forwarded: 
https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=32726

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-14682[0]:
| GetNextToken in MagickCore/token.c in ImageMagick 7.0.6 allows remote
| attackers to cause a denial of service (heap-based buffer overflow and
| application crash) or possibly have unspecified other impact via a
| crafted SVG document, a different vulnerability than CVE-2017-10928.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-14682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682
[1] https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=32726
[2] 
https://github.com/ImageMagick/ImageMagick/commit/3bee958ee63eb6ec62834d0c7b28b4b6835e6a00

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.8.9.9-5+deb8u11

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 876...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Muehlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 16 Nov 2017 23:13:59 +0100
Source: imagemagick
Binary: imagemagick-common imagemagick-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers imagemagick libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-2 
libmagickcore-6.q16-2-extra libmagickcore-6.q16-dev libmagickwand-6.q16-2 
libmagickwand-6.q16-dev libmagick++-6.q16-5 libmagick++-6.q16-dev 
imagemagick-dbg libimage-magick-q16-perl perlmagick libmagickcore-dev 
libmagickwand-dev libmagick++-dev
Architecture: source all amd64
Version: 8:6.8.9.9-5+deb8u11
Distribution: jessie-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Muehlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-common - image manipulation programs -- infrastructure
 imagemagick-dbg - debugging symbols for ImageMagick
 imagemagick-doc - document files of ImageMagick
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-5 - object-oriented C++ interface to ImageMagick
 libmagick++-6.q16-dev - object-oriented C++ interface to ImageMagick - 
development files
 libmagick++-dev - object-oriented C++ interface to ImageMagick
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library - header files
 libmagickcore-6.q16-2 - low-level image manipulation library -- quantum depth 
Q16
 libmagickcore-6.q16-2-extra - low-level image manipulation library - extra 
codecs (Q16)
 libmagickcore-6.q16-dev - low-level image manipulation library - development 
files (Q16)
 libmagickcore-dev - low-level image manipulation library -- transition package
 libmagickwand-6-headers - image manipulation library - headers files
 libmagickwand-6.q16-2 - image manipulation library
 libmagickwand-6.q16-dev - image manipulati

Processed: tagging 872195

2017-11-18 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 872195 + confirmed
Bug #872195 [tircd] tircd: fails to install: chown: cannot access 
'/var/lib/tircd': No such file or directory
Added tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
872195: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=872195
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#878527: marked as done (imagemagick: CVE-2017-14607)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 22:18:45 +
with message-id 
and subject line Bug#878527: fixed in imagemagick 8:6.8.9.9-5+deb8u11
has caused the Debian Bug report #878527,
regarding imagemagick: CVE-2017-14607
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
878527: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878527
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: important
Tags: patch security upstream
Forwarded: https://github.com/ImageMagick/ImageMagick/issues/765

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-14607[0]:
| In ImageMagick 7.0.7-4 Q16, an out of bounds read flaw related to
| ReadTIFFImage has been reported in coders/tiff.c. An attacker could
| possibly exploit this flaw to disclose potentially sensitive memory or
| cause an application crash.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-14607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607
[1] https://github.com/ImageMagick/ImageMagick/issues/765

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.8.9.9-5+deb8u11

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 878...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Muehlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 16 Nov 2017 23:13:59 +0100
Source: imagemagick
Binary: imagemagick-common imagemagick-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers imagemagick libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-2 
libmagickcore-6.q16-2-extra libmagickcore-6.q16-dev libmagickwand-6.q16-2 
libmagickwand-6.q16-dev libmagick++-6.q16-5 libmagick++-6.q16-dev 
imagemagick-dbg libimage-magick-q16-perl perlmagick libmagickcore-dev 
libmagickwand-dev libmagick++-dev
Architecture: source all amd64
Version: 8:6.8.9.9-5+deb8u11
Distribution: jessie-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Muehlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-common - image manipulation programs -- infrastructure
 imagemagick-dbg - debugging symbols for ImageMagick
 imagemagick-doc - document files of ImageMagick
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-5 - object-oriented C++ interface to ImageMagick
 libmagick++-6.q16-dev - object-oriented C++ interface to ImageMagick - 
development files
 libmagick++-dev - object-oriented C++ interface to ImageMagick
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library - header files
 libmagickcore-6.q16-2 - low-level image manipulation library -- quantum depth 
Q16
 libmagickcore-6.q16-2-extra - low-level image manipulation library - extra 
codecs (Q16)
 libmagickcore-6.q16-dev - low-level image manipulation library - development 
files (Q16)
 libmagickcore-dev - low-level image manipulation library -- transition package
 libmagickwand-6-headers - image manipulation library - headers files
 libmagickwand-6.q16-2 - image manipulation library
 libmagickwand-6.q16-dev - image manipulation library - development files
 libmagickwand-dev - image manipulation library - transition for development 
files
 perlmagick - Perl interface to ImageMagick -- transition package
Closes: 868469 869715 869728 8

Bug#878508: marked as done (imagemagick: CVE-2017-13758)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 22:18:45 +
with message-id 
and subject line Bug#878508: fixed in imagemagick 8:6.8.9.9-5+deb8u11
has caused the Debian Bug report #878508,
regarding imagemagick: CVE-2017-13758
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
878508: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878508
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: important
Tags: patch security upstream
Forwarded: 
https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=32583

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-13758[0]:
| In ImageMagick 7.0.6-10, there is a heap-based buffer overflow in the
| TracePoint() function in MagickCore/draw.c.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-13758
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758
[1] https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=32583

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.8.9.9-5+deb8u11

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 878...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Muehlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 16 Nov 2017 23:13:59 +0100
Source: imagemagick
Binary: imagemagick-common imagemagick-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers imagemagick libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-2 
libmagickcore-6.q16-2-extra libmagickcore-6.q16-dev libmagickwand-6.q16-2 
libmagickwand-6.q16-dev libmagick++-6.q16-5 libmagick++-6.q16-dev 
imagemagick-dbg libimage-magick-q16-perl perlmagick libmagickcore-dev 
libmagickwand-dev libmagick++-dev
Architecture: source all amd64
Version: 8:6.8.9.9-5+deb8u11
Distribution: jessie-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Muehlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-common - image manipulation programs -- infrastructure
 imagemagick-dbg - debugging symbols for ImageMagick
 imagemagick-doc - document files of ImageMagick
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-5 - object-oriented C++ interface to ImageMagick
 libmagick++-6.q16-dev - object-oriented C++ interface to ImageMagick - 
development files
 libmagick++-dev - object-oriented C++ interface to ImageMagick
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library - header files
 libmagickcore-6.q16-2 - low-level image manipulation library -- quantum depth 
Q16
 libmagickcore-6.q16-2-extra - low-level image manipulation library - extra 
codecs (Q16)
 libmagickcore-6.q16-dev - low-level image manipulation library - development 
files (Q16)
 libmagickcore-dev - low-level image manipulation library -- transition package
 libmagickwand-6-headers - image manipulation library - headers files
 libmagickwand-6.q16-2 - image manipulation library
 libmagickwand-6.q16-dev - image manipulation library - development files
 libmagickwand-dev - image manipulation library - transition for development 
files
 perlmagick - Perl interface to ImageMagick -- transition package
Closes: 868469 869715 869728 870067 870106 870109 872373 873099 873134 876097 
876488 878507 878508 878527 878562 8785

Bug#878562: marked as done (imagemagick: CVE-2017-14989)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 22:18:45 +
with message-id 
and subject line Bug#878562: fixed in imagemagick 8:6.8.9.9-5+deb8u11
has caused the Debian Bug report #878562,
regarding imagemagick: CVE-2017-14989
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
878562: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878562
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.8.9.9-1
Severity: important
Tags: patch security upstream
Forwarded: https://github.com/ImageMagick/ImageMagick/issues/781

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-14989[0]:
| A use-after-free in RenderFreetype in MagickCore/annotate.c in
| ImageMagick 7.0.7-4 Q16 allows attackers to crash the application via a
| crafted font file, because the FT_Done_Glyph function (from FreeType 2)
| is called at an incorrect place in the ImageMagick code.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-14989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989
[1] https://github.com/ImageMagick/ImageMagick/issues/781

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.8.9.9-5+deb8u11

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 878...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Muehlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 16 Nov 2017 23:13:59 +0100
Source: imagemagick
Binary: imagemagick-common imagemagick-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers imagemagick libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-2 
libmagickcore-6.q16-2-extra libmagickcore-6.q16-dev libmagickwand-6.q16-2 
libmagickwand-6.q16-dev libmagick++-6.q16-5 libmagick++-6.q16-dev 
imagemagick-dbg libimage-magick-q16-perl perlmagick libmagickcore-dev 
libmagickwand-dev libmagick++-dev
Architecture: source all amd64
Version: 8:6.8.9.9-5+deb8u11
Distribution: jessie-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Muehlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-common - image manipulation programs -- infrastructure
 imagemagick-dbg - debugging symbols for ImageMagick
 imagemagick-doc - document files of ImageMagick
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-5 - object-oriented C++ interface to ImageMagick
 libmagick++-6.q16-dev - object-oriented C++ interface to ImageMagick - 
development files
 libmagick++-dev - object-oriented C++ interface to ImageMagick
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library - header files
 libmagickcore-6.q16-2 - low-level image manipulation library -- quantum depth 
Q16
 libmagickcore-6.q16-2-extra - low-level image manipulation library - extra 
codecs (Q16)
 libmagickcore-6.q16-dev - low-level image manipulation library - development 
files (Q16)
 libmagickcore-dev - low-level image manipulation library -- transition package
 libmagickwand-6-headers - image manipulation library - headers files
 libmagickwand-6.q16-2 - image manipulation library
 libmagickwand-6.q16-dev - image manipulation library - development files
 libmagickwand-dev - image manipulation library - transition for development 
files
 perlmagick - Perl interface to ImageMagick -- transition package
Closes: 868469 869715 869728 870067 870106 870109 872373 873099 

Bug#878578: marked as done (imagemagick: CVE-2017-15277)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 22:18:46 +
with message-id 
and subject line Bug#878578: fixed in imagemagick 8:6.8.9.9-5+deb8u11
has caused the Debian Bug report #878578,
regarding imagemagick: CVE-2017-15277
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
878578: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878578
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: important
Tags: patch security upstream
Forwarded: https://github.com/ImageMagick/ImageMagick/issues/592

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-15277[0]:
| ReadGIFImage in coders/gif.c in ImageMagick 7.0.6-1 and GraphicsMagick
| 1.3.26 leaves the palette uninitialized when processing a GIF file that
| has neither a global nor local palette. If the affected product is used
| as a library loaded into a process that operates on interesting data,
| this data sometimes can be leaked via the uninitialized palette.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-15277
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277
[1] https://github.com/ImageMagick/ImageMagick/issues/592

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.8.9.9-5+deb8u11

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 878...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Muehlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 16 Nov 2017 23:13:59 +0100
Source: imagemagick
Binary: imagemagick-common imagemagick-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers imagemagick libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-2 
libmagickcore-6.q16-2-extra libmagickcore-6.q16-dev libmagickwand-6.q16-2 
libmagickwand-6.q16-dev libmagick++-6.q16-5 libmagick++-6.q16-dev 
imagemagick-dbg libimage-magick-q16-perl perlmagick libmagickcore-dev 
libmagickwand-dev libmagick++-dev
Architecture: source all amd64
Version: 8:6.8.9.9-5+deb8u11
Distribution: jessie-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Muehlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-common - image manipulation programs -- infrastructure
 imagemagick-dbg - debugging symbols for ImageMagick
 imagemagick-doc - document files of ImageMagick
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-5 - object-oriented C++ interface to ImageMagick
 libmagick++-6.q16-dev - object-oriented C++ interface to ImageMagick - 
development files
 libmagick++-dev - object-oriented C++ interface to ImageMagick
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library - header files
 libmagickcore-6.q16-2 - low-level image manipulation library -- quantum depth 
Q16
 libmagickcore-6.q16-2-extra - low-level image manipulation library - extra 
codecs (Q16)
 libmagickcore-6.q16-dev - low-level image manipulation library - development 
files (Q16)
 libmagickcore-dev - low-level image manipulation library -- transition package
 libmagickwand-6-headers - image manipulation library - headers files
 libmagickwand-6.q16-2 - image manipulation library
 libmagickwand-6.q16-dev - image manipulation library - development files
 libmagickwand-dev - image manipulation library - transition 

Bug#880116: marked as done (CVE-2017-15953 / CVE-2017-15954 / CVE-2017-15955)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 22:17:26 +
with message-id 
and subject line Bug#880116: fixed in bchunk 1.2.0-12+deb8u1
has caused the Debian Bug report #880116,
regarding CVE-2017-15953 / CVE-2017-15954 / CVE-2017-15955
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
880116: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880116
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: bchunk
Severity: grave
Tags: security

Please see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15955
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15954
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15953

Cheers,
Moritz
--- End Message ---
--- Begin Message ---
Source: bchunk
Source-Version: 1.2.0-12+deb8u1

We believe that the bug you reported is fixed in the latest version of
bchunk, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 880...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Markus Koschany  (supplier of updated bchunk package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 08 Nov 2017 19:41:33 +0100
Source: bchunk
Binary: bchunk
Architecture: source amd64
Version: 1.2.0-12+deb8u1
Distribution: jessie-security
Urgency: high
Maintainer: Praveen Arimbrathodiyil 
Changed-By: Markus Koschany 
Description:
 bchunk - CD image format conversion from bin/cue to iso/cdr
Closes: 880116
Changes:
 bchunk (1.2.0-12+deb8u1) jessie-security; urgency=high
 .
   * Non-maintainer upload.
   * Fix CVE-2017-15953, CVE-2017-15954 and CVE-2017-15955.
 bchunk was vulnerable to a heap-based buffer overflow with an resultant
 invalid free when processing a malformed CUE (.cue) file that may lead to
 the execution of arbitrary code or a application crash. (Closes: #880116)
Checksums-Sha1:
 81aebe5683cd802defc06114a2078eadd3315718 1992 bchunk_1.2.0-12+deb8u1.dsc
 54309a79f5e90d845d836cad901ca5f0a8cd5184 5440 
bchunk_1.2.0-12+deb8u1.debian.tar.xz
 17bb2d6fc9b36ec88862ac903ad47d4c80aab8a4 13864 bchunk_1.2.0-12+deb8u1_amd64.deb
Checksums-Sha256:
 12114df1896dcb4b983641700cf7c6a8cbc9912bbae982970a2a5bbcf5b9650c 1992 
bchunk_1.2.0-12+deb8u1.dsc
 4675cb7b566b514e0fb2b7b5a1cf7b77df7443f22f7dd3eccd178fcffbf8161e 5440 
bchunk_1.2.0-12+deb8u1.debian.tar.xz
 420d6352929d09aaa632a1168e60c39f93593d36cc4023ca52198f919d3ec463 13864 
bchunk_1.2.0-12+deb8u1_amd64.deb
Files:
 6e3c98ec0c298aaa6a78de8af0ccd9f7 1992 otherosfs optional 
bchunk_1.2.0-12+deb8u1.dsc
 46e56c811a30bbdbf839d9a2c80c07e2 5440 otherosfs optional 
bchunk_1.2.0-12+deb8u1.debian.tar.xz
 1043ffd19658501b4ec84ab583d1a400 13864 otherosfs optional 
bchunk_1.2.0-12+deb8u1_amd64.deb

-BEGIN PGP SIGNATURE-

iQKjBAEBCgCNFiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAloEVgxfFIAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD
RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQPHGFwb0BkZWJp
YW4ub3JnAAoJENmtFLlRO1HkebgP/1oddsoozMfNnHme2Lk1TF09gX6TaEQA00fx
98FuPGuv17Wd/qO/WXPiflTrz/HiiEwHwfl5HHfMZBxKjTp409rIgnR+NIvkvD/K
KFteObQQ+bwGB/Zth6KoRISHe9nhPyPp5L+YK4uc5s0qjWjZNzjWOtwUtBklNZvb
dfvR+7RC8ITNjA4PJ9WFl4+fmJuuwgaYRltjxURLOhMI3AJBCMj20lU9h2+9c9YD
VuRj8hXIybSo1K6mgJHnbxvoCgEqqaZrk86JgAw7oWyd9dTUxyeARpttm9Zlzi3q
ePBWZcLc055n/cuSrJ5Pyg+8eFLaQxTr4MBPrie5T+4tp9StHR57BzGrM1BktqeE
6Ul8wtvMHxlLx7dFu8tD0fNth88X0xIdHEhPjlagCpC0aAUBt1Z9laXu+aTPqCaj
vQrTpKJP99o3qrzgKY6zutie9+ItMcbthVh3UYAyL8k/VcICrJVk+q7/7TdwujAG
jHJvBkO9CJS2q9aIMfY9Xhd+vUT8w3Z1zM0ZoiGLXYUP3Ur6DweExxOKYWez6rG3
btfVU6udQVAh53Q8yR19mYvlzu33VrIgzGlaqoxeii22aR6oPajMiyACsOugzrf0
xQ1k2kKKvdyvFWjeknNC7kd46ejEcZmVim8CFIvLqaETlmAUTj58rmX/q098Hp0h
6zBLBprH
=blqQ
-END PGP SIGNATURE End Message ---


Bug#879521: marked as done (irssi: multiple vulnerabilities fixed in irssi 1.0.5)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 22:18:55 +
with message-id 
and subject line Bug#879521: fixed in irssi 0.8.17-1+deb8u5
has caused the Debian Bug report #879521,
regarding irssi: multiple vulnerabilities fixed in irssi 1.0.5
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
879521: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879521
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: irssi
Severity: grave
Tags: security
Justification: user security hole

Hi,

irssi 1.0.5 has been released, fixing multiple vulnerabilities

(a) When installing themes with unterminated colour formatting
sequences, Irssi may access data beyond the end of the
string. (CWE-126) Found by Hanno Böck.

CVE-2017-15228 was assigned to this issue.

(b) While waiting for the channel synchronisation, Irssi may
incorrectly fail to remove destroyed channels from the query list,
resulting in use after free conditions when updating the state
later on. Found by Joseph Bisch. (CWE-416 caused by CWE-672)

CVE-2017-15227 was assigned to this issue.

(c) Certain incorrectly formatted DCC CTCP messages could cause NULL
pointer dereference. Found by Joseph Bisch. This is a separate,
but similar issue to CVE-2017-9468. (CWE-690)

CVE-2017-15721 was assigned to this issue.

(d) Overlong nicks or targets may result in a NULL pointer dereference
while splitting the message. Found by Joseph Bisch. (CWE-690)

CVE-2017-15723 was assigned to this issue.

(e) In certain cases Irssi may fail to verify that a Safe channel ID
is long enough, causing reads beyond the end of the string. Found
by Joseph Bisch. (CWE-126)

CVE-2017-15722 was assigned to this issue.

Can you prepare updates for sid, stretch and jessie (please coordinate with 
security team at t...@security.debian.org for the latter two)? Please add CVE 
numbers to the changelog so we can track them easily.

Regards,
-- 
Yves-Alexis
Debian security team

-- System Information:
Debian Release: buster/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (500, 
'oldstable'), (450, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.13.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_FR.utf8, LC_CTYPE=fr_FR.utf8 (charmap=UTF-8), 
LANGUAGE=fr_FR.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
--- End Message ---
--- Begin Message ---
Source: irssi
Source-Version: 0.8.17-1+deb8u5

We believe that the bug you reported is fixed in the latest version of
irssi, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 879...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso  (supplier of updated irssi package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 01 Nov 2017 22:57:01 +0100
Source: irssi
Binary: irssi irssi-dbg irssi-dev
Architecture: source
Version: 0.8.17-1+deb8u5
Distribution: jessie-security
Urgency: high
Maintainer: Rhonda D'Vine 
Changed-By: Salvatore Bonaccorso 
Closes: 867598 879521
Description: 
 irssi  - terminal based IRC client
 irssi-dbg  - terminal based IRC client (debugging symbols)
 irssi-dev  - terminal based IRC client - development files
Changes:
 irssi (0.8.17-1+deb8u5) jessie-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * Address IRSSI-SA-2017-07.
 - CVE-2017-10965: NULL pointer dereference when receiving messages
   with invalid timestamp.
 - CVE-2017-10966: Use after free after nicklist structure has been
   corrupted while updating a nick group.
 (Closes: #867598)
   * Address IRSSI-SA-2017-10.
 - CVE-2017-15228: Unterminated colour formatting sequences may cause
   data access beyond the end of the buffer.
 - CVE-2017-15227: Failure to remove destroyed channels from
   the query list while waiting for the channel synchronisation
   may result in use after free conditions when updating the
   state later on.
 - CVE-2017-15721: Certain incorrectly formatted DCC CTCP messages
  

Bug#879001: marked as done (CVE-2017-12197: libpam4j: Account check bypass)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 22:19:23 +
with message-id 
and subject line Bug#879001: fixed in libpam4j 1.4-2+deb8u1
has caused the Debian Bug report #879001,
regarding CVE-2017-12197: libpam4j: Account check bypass
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
879001: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879001
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: libpam4j
Version: 1.4-2
Severity: grave
Tags: security

Hi,

the following vulnerability was published for libpam4j.

CVE-2017-12197[0]: libpam4j: Account check bypass

PAM.authentication() does not call pam_acct_mgmt(). As a consequence, the
PAM account is not properly verified. Any user with a valid password but
with deactivated or disabled account is able to log in.

https://bugzilla.redhat.com/show_bug.cgi?id=1503103

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-12197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12197

Please adjust the affected versions in the BTS as needed.



-- 
Raphaël Hertzog ◈ Debian Developer

Support Debian LTS: https://www.freexian.com/services/debian-lts.html
Learn to master Debian: https://debian-handbook.info/get/
--- End Message ---
--- Begin Message ---
Source: libpam4j
Source-Version: 1.4-2+deb8u1

We believe that the bug you reported is fixed in the latest version of
libpam4j, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 879...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Markus Koschany  (supplier of updated libpam4j package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 07 Nov 2017 13:40:55 +0100
Source: libpam4j
Binary: libpam4j-java libpam4j-java-doc
Architecture: source all
Version: 1.4-2+deb8u1
Distribution: jessie-security
Urgency: high
Maintainer: Debian Java Maintainers 

Changed-By: Markus Koschany 
Description:
 libpam4j-java - Java binding for libpam.so
 libpam4j-java-doc - Documentation for Java binding for libpam.so
Closes: 879001
Changes:
 libpam4j (1.4-2+deb8u1) jessie-security; urgency=high
 .
   * Team upload.
   * Fix CVE-2017-12197 (Closes: #879001):
 It was discovered that libpam4j does not call pam_acct_mgmt().
 As a consequence, the PAM account is not properly
 verified. Any user with a valid password but with deactivated or
 disabled account was able to log in.
Checksums-Sha1:
 105d9b87b0572ff220531668a544997812788ac6 2288 libpam4j_1.4-2+deb8u1.dsc
 1335e34fba33ab2531265ced9dbd58295476a81c 6880 libpam4j_1.4.orig.tar.gz
 2500657ab3ebc3545fa6d3e45feac626a6e8c3e6 4980 
libpam4j_1.4-2+deb8u1.debian.tar.xz
 2c0ed786161a14cab91cf296adc0c076ca7827d9 14868 
libpam4j-java_1.4-2+deb8u1_all.deb
 618779d577c23c5dd835c339013955f2024d7a11 129648 
libpam4j-java-doc_1.4-2+deb8u1_all.deb
Checksums-Sha256:
 5fae6bbd99b2cf248270243c6cec0d56e740d618c75bc24032555b20af4c175c 2288 
libpam4j_1.4-2+deb8u1.dsc
 83e738e7e6d5055adaaffccd0caa10ba03a13ea59bd016f9bb4d1306c7c3f550 6880 
libpam4j_1.4.orig.tar.gz
 7614b9fab4a0102f6dd2a30ed6d76781aea31955f35839513c4a858a06307dc2 4980 
libpam4j_1.4-2+deb8u1.debian.tar.xz
 f7fa3cea0a66abaa813daab57eb3be02de07bd23d2a21049699ab0b1c2a77c7d 14868 
libpam4j-java_1.4-2+deb8u1_all.deb
 82920e6410269ca366f4dc17d8c38701fff12abe14a7721b68adbc3afd2e42d9 129648 
libpam4j-java-doc_1.4-2+deb8u1_all.deb
Files:
 e8fbbb11541dce6adc63149f509dbcf4 2288 java optional libpam4j_1.4-2+deb8u1.dsc
 20d90b25f700a559f022d870682f5659 6880 java optional libpam4j_1.4.orig.tar.gz
 33b0e775cee4e845cb9e45e42e5b7865 4980 java optional 
libpam4j_1.4-2+deb8u1.debian.tar.xz
 8d3f16b7266b1a7e1f2ad5413252811b 14868 java optional 
libpam4j-java_1.4-2+deb8u1_all.deb
 8b6f74c2a9b50b6ed9071b4c83a9121f 129648 doc optional 
libpam4j-java-doc_1.4-2+deb8u1_all.deb

-BEGIN PGP SIGNATURE-

iQKjBAEBCgCNFiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAloB63JfFIAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD
RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEz

Bug#878507: marked as done (imagemagick: CVE-2017-13769)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 22:18:45 +
with message-id 
and subject line Bug#878507: fixed in imagemagick 8:6.8.9.9-5+deb8u11
has caused the Debian Bug report #878507,
regarding imagemagick: CVE-2017-13769
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
878507: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878507
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: imagemagick
Version: 8:6.9.7.4+dfsg-11
Severity: important
Tags: patch security upstream
Forwarded: https://github.com/ImageMagick/ImageMagick/issues/705

Hi,

the following vulnerability was published for imagemagick.

CVE-2017-13769[0]:
| The WriteTHUMBNAILImage function in coders/thumbnail.c in ImageMagick
| through 7.0.6-10 allows an attacker to cause a denial of service
| (buffer over-read) by sending a crafted JPEG file.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-13769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769
[1] https://github.com/ImageMagick/ImageMagick/issues/705

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: imagemagick
Source-Version: 8:6.8.9.9-5+deb8u11

We believe that the bug you reported is fixed in the latest version of
imagemagick, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 878...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Moritz Muehlenhoff  (supplier of updated imagemagick package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 16 Nov 2017 23:13:59 +0100
Source: imagemagick
Binary: imagemagick-common imagemagick-doc libmagickcore-6-headers 
libmagickwand-6-headers libmagick++-6-headers imagemagick libimage-magick-perl 
libmagickcore-6-arch-config imagemagick-6.q16 libmagickcore-6.q16-2 
libmagickcore-6.q16-2-extra libmagickcore-6.q16-dev libmagickwand-6.q16-2 
libmagickwand-6.q16-dev libmagick++-6.q16-5 libmagick++-6.q16-dev 
imagemagick-dbg libimage-magick-q16-perl perlmagick libmagickcore-dev 
libmagickwand-dev libmagick++-dev
Architecture: source all amd64
Version: 8:6.8.9.9-5+deb8u11
Distribution: jessie-security
Urgency: medium
Maintainer: ImageMagick Packaging Team 

Changed-By: Moritz Muehlenhoff 
Description:
 imagemagick - image manipulation programs -- binaries
 imagemagick-6.q16 - image manipulation programs -- quantum depth Q16
 imagemagick-common - image manipulation programs -- infrastructure
 imagemagick-dbg - debugging symbols for ImageMagick
 imagemagick-doc - document files of ImageMagick
 libimage-magick-perl - Perl interface to the ImageMagick graphics routines
 libimage-magick-q16-perl - Perl interface to the ImageMagick graphics routines 
-- Q16 versio
 libmagick++-6-headers - object-oriented C++ interface to ImageMagick - header 
files
 libmagick++-6.q16-5 - object-oriented C++ interface to ImageMagick
 libmagick++-6.q16-dev - object-oriented C++ interface to ImageMagick - 
development files
 libmagick++-dev - object-oriented C++ interface to ImageMagick
 libmagickcore-6-arch-config - low-level image manipulation library - 
architecture header files
 libmagickcore-6-headers - low-level image manipulation library - header files
 libmagickcore-6.q16-2 - low-level image manipulation library -- quantum depth 
Q16
 libmagickcore-6.q16-2-extra - low-level image manipulation library - extra 
codecs (Q16)
 libmagickcore-6.q16-dev - low-level image manipulation library - development 
files (Q16)
 libmagickcore-dev - low-level image manipulation library -- transition package
 libmagickwand-6-headers - image manipulation library - headers files
 libmagickwand-6.q16-2 - image manipulation library
 libmagickwand-6.q16-dev - image manipulation library - development files
 libmagickwand-dev - image manipulation library - transition for development 
files
 perlmagick - Perl interface to ImageMagick -- transition package
Closes: 868469 869715 869728 870067 870106 870109 872373 873099 873134 876097 

Bug#879474: marked as done (quagga-bgpd: CVE-2017-16227: BGP session termination due to rather long AS paths in update messages)

2017-11-18 Thread Debian Bug Tracking System
Your message dated Sat, 18 Nov 2017 22:21:36 +
with message-id 
and subject line Bug#879474: fixed in quagga 0.99.23.1-1+deb8u4
has caused the Debian Bug report #879474,
regarding quagga-bgpd: CVE-2017-16227: BGP session termination due to rather 
long AS paths in update messages
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
879474: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879474
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: quagga-bgpd
Version: 1.1.1-3
Severity: important
Tags: security upstream

Dear Maintainer,

there is a longstanding bug in quagga where certain BGP update messages
cause a quagga bgpd to drop a session, possibly resulting in loss of
network connectivity.


Details:

Long paths in update messages are segmented in BGP, and the bug is in
the recalculation of the framing information if there are more than two
segments. The resulting data is invalid but will will be used for
redistribution. At least if the receiver is another quagga bgpd, that
message is rejected, eventually resulting in a BGP session termination.

The receiver's log (if written) contains an error message like
| BGP: 172.23.97.181: BGP type 2 length 3074 is too large, attribute total 
length is 2069.  attr_endp is 0x562feb368121.  endp is 0x562feb367d2c
then.

So if a site's BGP peers all run quagga, that site will lose network
connectivity due to frequent session termination. Additionally, the
repeated initial full table transfer will result in a significantly
bigger network load, I've seen around 1 MByte/sec/link, compared to
usually less than one 1 kbyte/sec/link.

Such extremely long AS paths have occured in the global BGP table at
least four times since June. Last time started on Oct 13th around 20:43
UTC and lasted until the following week.

All versions of quagga in Debian are affected.


How to fix:

Kudos to Andreas Jaggi who identified the bug and provided a fix[1].
After some hours of work I was able to reproduce the issue and can
confirm this patch resolves the issues for all versions of quagga in
Debian (wheezy, jessie, stretch = buster = sid). Details about the
setup available upon request, it's just some stuff to write down.


In my opinion this is serious enough to justify a security upload. If
stable security disagrees, please fix this in the next stable point
release.

Regards,
Christoph

[1] https://lists.quagga.net/pipermail/quagga-dev/2017-September/033284.html

http://git.savannah.gnu.org/cgit/quagga.git/commit/?id=7a42b78be9a4108d98833069a88e6fddb9285008



signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
Source: quagga
Source-Version: 0.99.23.1-1+deb8u4

We believe that the bug you reported is fixed in the latest version of
quagga, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 879...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso  (supplier of updated quagga package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 30 Oct 2017 06:38:36 +0100
Source: quagga
Binary: quagga quagga-dbg quagga-doc
Architecture: all source
Version: 0.99.23.1-1+deb8u4
Distribution: jessie-security
Urgency: high
Maintainer: Christian Hammers 
Changed-By: Salvatore Bonaccorso 
Closes: 879474
Description: 
 quagga - BGP/OSPF/RIP routing daemon
 quagga-dbg - BGP/OSPF/RIP routing daemon (debug symbols)
 quagga-doc - documentation files for quagga
Changes:
 quagga (0.99.23.1-1+deb8u4) jessie-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * bgpd: Fix AS_PATH size calculation for long paths (CVE-2017-16227)
 (Closes: #879474)
Checksums-Sha1: 
 7a5ccdd7208ba03181cea4a379d599f14245376a 2335 quagga_0.99.23.1-1+deb8u4.dsc
 5d2f4e1c0afee677e607c35ce42d26da37cff9e6 39536 
quagga_0.99.23.1-1+deb8u4.debian.tar.xz
 01dfd91b08b445e3e46fe90dccfc9cee1cd494a7 907776 
quagga-doc_0.99.23.1-1+deb8u4_all.deb
Checksums-Sha256: 
 597a3623f5dda14bd27f278834c9e983c03dc7166f885b299fefffbc35db69e6 2335 
quagga_0.99.23.1-1+deb8u4.dsc
 07d9fe87596388d2fef83227f4a8052c6dc59c5d01a11938ddd7b088b0797e3c 39536 
quagga_0

  1   2   >